Cryptography Algorithms and Security of Information Systems (ΠΛ7): Διαφορά μεταξύ των αναθεωρήσεων
Από Wiki Τμήματος Μαθηματικών
| Γραμμή 69: | Γραμμή 69: | ||
=== Syllabus === | === Syllabus === | ||
# Basic Concepts and Definitions in the Security of Information Systems. | |||
# Cryptographic issues: Symmetric, non-symmetric encryption, fraction cipher, cryptographic modes and public key cryptography flow, cryptographic summary functions, cryptanalysis. | |||
# Authentication Protocols and Authentication technologies, One-way hash functions, digital certificates, digital signatures, infrastructure (PKI) and public key algorithms (RSA, DSA, Diffie-Hellman, Elliptic curve) and number theory underlies. | |||
# Development and implementation of C/C++ cryptographic algorithms: Symmetric (DES, AES, 3DES, Blowfish) | |||
# Implementation in C / C++ public key security mechanisms (RSA, Diffie-Hellman), and summary (MD5, SHA) | |||
# Secure elections, anonymous protocols- Anonymity, Transaction Protocols, NFC protocols and security mechanisms, RFID Crypto-1 algorithm and key exchange infrastructures | |||
# Malware models and categories, rootkits, viruses, exploits. Database Security: Basic concepts, models and policies for database access control and methodological framework for safe database and application services design, SQL injections, services monitoring | |||
# System security and management at OS level Windows and Linux. Security issues at user level and administrative management techniques. | |||
# Security of Services: Portscan attacks, Denial of Service attacks, MitM attacks, remote exploits, buffer overflows, Network Security: IP spoofing, ARP spoofing, hijacking, sniffing | |||
# Security Strategies, Network Security components and mechanisms. Perimeter Network defense and safe management: Firewalls, NIDS, designing Identification and Encryption Services | |||
# Presentation of SSL and x.509 certificates. Create and verify digital signature: DSA algorithm, key creation, signing, and verification. Presentation of the GPG tool for email. Creating Certificates. | |||
# Perimeter defense - Firewalls: Create a firewall security policy. Secure network management: Use appropriate SNMP communication software for secure network management. Introduction to IPSec, Virtual Networks, OpenVPN Tool. Presentation of NIDS tools. | |||
# Learn script programming language for Windows AutoIT for Administrative and security tasks and secure tasks-methods implementation | |||
=== Teaching and Learning Methods - Evaluation === | === Teaching and Learning Methods - Evaluation === | ||
Αναθεώρηση της 20:13, 10 Νοεμβρίου 2022
Graduate Courses Outlines - Department of Mathematics
General
| School | School of Science |
|---|---|
| Academic Unit | Department of Mathematics |
| Level of Studies | Graduate |
| Course Code | ΠΛ7 |
| Semester | 2 |
| Course Title | Cryptography Algorithms and Security of Information Systems |
| Independent Teaching Activities | Lectures (Weekly Teaching Hours: 3, Credits: 7.5) |
| Course Type | Specialized general knowledge |
| Prerequisite Courses | - |
| Language of Instruction and Examinations |
Greek |
| Is the Course Offered to Erasmus Students | Yes (in English) |
| Course Website (URL) | See eCourse, the Learning Management System maintained by the University of Ioannina. |
Learning Outcomes
| Learning outcomes |
Upon completion of this course postgraduate students:
They will be able to develop cryptographic algorithms and implement encryption methods over a networking environment, to develop secure service mechanisms and algorithms using programming languages such as C / C ++ and libraries such as Libgcrypt and Libmcrypt.
They will be able to distinguish the basic vulnerabilities of Web and application service systems, especially SQL-injection attacks and buffer overflows, and develop appropriate defensive mechanisms.
|
|---|---|
| General Competences |
|
Syllabus
- Basic Concepts and Definitions in the Security of Information Systems.
- Cryptographic issues: Symmetric, non-symmetric encryption, fraction cipher, cryptographic modes and public key cryptography flow, cryptographic summary functions, cryptanalysis.
- Authentication Protocols and Authentication technologies, One-way hash functions, digital certificates, digital signatures, infrastructure (PKI) and public key algorithms (RSA, DSA, Diffie-Hellman, Elliptic curve) and number theory underlies.
- Development and implementation of C/C++ cryptographic algorithms: Symmetric (DES, AES, 3DES, Blowfish)
- Implementation in C / C++ public key security mechanisms (RSA, Diffie-Hellman), and summary (MD5, SHA)
- Secure elections, anonymous protocols- Anonymity, Transaction Protocols, NFC protocols and security mechanisms, RFID Crypto-1 algorithm and key exchange infrastructures
- Malware models and categories, rootkits, viruses, exploits. Database Security: Basic concepts, models and policies for database access control and methodological framework for safe database and application services design, SQL injections, services monitoring
- System security and management at OS level Windows and Linux. Security issues at user level and administrative management techniques.
- Security of Services: Portscan attacks, Denial of Service attacks, MitM attacks, remote exploits, buffer overflows, Network Security: IP spoofing, ARP spoofing, hijacking, sniffing
- Security Strategies, Network Security components and mechanisms. Perimeter Network defense and safe management: Firewalls, NIDS, designing Identification and Encryption Services
- Presentation of SSL and x.509 certificates. Create and verify digital signature: DSA algorithm, key creation, signing, and verification. Presentation of the GPG tool for email. Creating Certificates.
- Perimeter defense - Firewalls: Create a firewall security policy. Secure network management: Use appropriate SNMP communication software for secure network management. Introduction to IPSec, Virtual Networks, OpenVPN Tool. Presentation of NIDS tools.
- Learn script programming language for Windows AutoIT for Administrative and security tasks and secure tasks-methods implementation
Teaching and Learning Methods - Evaluation
| Delivery |
ΧΧΧ | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Use of Information and Communications Technology |
ΧΧΧ | ||||||||||
| Teaching Methods |
| ||||||||||
| Student Performance Evaluation |
ΧΧΧ |