Introduction to Cryptography and Security

Posted on August 27, 2013 – 15:17
ESGD422210107042009

6 weeks, 2 ECTS

Responsible

Bruno Martin

Teaching team

Simon Giraudot , Bruno Martin, Riccardo Ravaioli

Quality / cv

Bruno Martin is the author of twenty publications including a dozen journal articles and the book " Coding, cryptography and applications . " It applies knowledge of cryptography (theoretical) to network security (practice) for almost ten years using free software.

Summary

This course provides an introduction to cryptography and network security.

Objectives

Present the various aspects of security. Both on the side of the attacker (threats) that the side of the safety engineer (defenses).

Content
  1. Introduction to security threats and presentation and TD1
  2. I Elements of cryptography and TD2
  3. Elements II cryptography and TD3
  4. Hash certification protocols the TD4 and its files
  5. How hackers do it, how secure and TD5 .
Prerequisites
  • concepts of mathematics undergraduate
  • notions on computer networks
Test your knowledge
  • Continuous monitoring (TP noted), 1/3 of the final mark: the report in pdf TP sessions 4 and 5 to send (encrypted and signed) by email on 29 March 2013.
  • A final exam (2 hours, all documents allowed), 2/3 of the final grade,
Previous review

corrected exam 2013 in pdf format.

Bibliography
  • B. Martin, coding, cryptography and applications, PPUR, 2004
  • A. Noordergraaf, How hackers do it, Sun Blueprints, 2002
  • D. Solomon, Foundations of Computer Security, Springer, 2006
  • W. Stallings, Cryptography and network security, Prentice Hall, 2006
  • FreeBSD Handbook, chapter 14, Security
  • Guide to the Secure Configuration of RH Enterprise Linux 5
  • Linux security HOWTO
Electronic Resources

Contact
Search:
Laboratory I3S ,
CNRS-UMR 7271, BP 121,
2000 road fireflies,
06903 Sophia Antipolis cedex
tel: 04 92 94 27 23
[Map] Education:
Dept. computer ,
Valrose Park
28 Avenue Valrose
06108 Nice cedex 2
tel: 04 92 07 69 85
as (internal): 12654
[Map]


GPG key: 0x18c2df9b85d5ecae

Source: deptinfo.unice.fr

Prentice Hall Cryptography and Network Security: Principles and Practice (6th Edition)
Book (Prentice Hall)

Not using Windows is the best security

2008-08-03 18:09:58 by trimtab

Windows is the most insecure system. It was never designed for use on the Internet or any public network.
If you want security get Linux or a Mac and run your legacy Windows apps via Virtualization. You can copy an existing Windows image and go!
If you are paying for Anti* software there is something wrong with the operating system you are using on the Internet. The solution is to get and use an OS that does not need the illusion of a janitor cleaning up AFTER it is already infected and calling that security. That's all that can ever be done with Windows

You might also like:

Full Video-Obama

Bitcoin is legal, let it evolve into its role, researchers urge  — TechHive
That network, they note, serves the same function of trusted third parties like PayPal or MasterCard that act as ledger keepers, ensuring through a form of public-key cryptography that the value of an electronic payment is deducted from the payer's ..

Related posts:

  1. Cryptography Network Security Lecture Notes
  2. Cryptography Network Security Final Exam
  3. Cryptography Network Security Lab Manual
  4. Cryptography and Network Security w.stallings