curso 2013-2014

Estudis d'Enginyeria Tècnica de Telecomunicació (especialitzada en Telemàtica)

Transmissió de Dades II (12629)

Number of Credits: 4.5 Number of Credits ECTS: 3.6

Student Effort (Total Hours): 90

Timing:

Year: 2nd

Type: quarter

Number: 2nd

 
Introduction
 
This course covers the security aspects of data transmission. It is part of a group of data transmission courses (Transmissió de Dades I, II, and III) and fits in the context of the communication theory related courses taught in the Telecommunications studies as shown in the diagram below. It is essentially an introductory course on Cryptography and Network Security.
  
In this course, the students will learn the basic concepts related to network security and cryptography. This includes the analysis and design of symmetric and public-key encryption algorithms and hash functions, and their applications to network security.
  
Prerequisites
 

 This course is mostly self-contained, however, a basic knowledge of the following subjects will be needed in understanding the encryption/decryption algorithms:
 
  • number theory
  • modular arithmetics
  • probability theory
 
There will be a review of the aforementioned concepts in the beginning of the class.
 
Also, in order to better understand theoretical concepts learned in class, there will be two class projects which may be in the form of programming. The students can use any programming language they feel comfortable with. Therefore, although the students will not be tested on their programming skills, the knowledge of a programming language (C, Java, etc.) is also required for this course.
 
This course will be taught in English. For the exams, a translation of the questions in Catalan or Spanish will also be available.
 
Competences 

 
 
 
General Competences
Specific Competences
 
 
Instrumental
 
  1. Creative thinking and analyzing abilities
  2. Problem solving abilities
 
  1. Knowledge of a programming language
  2. Knowledge of English
     
  3.  
 
 
Interpersonals
 
  1. Capacity to do teamwork
  2. Capacity to effectively interact in class with the teacher as well as other students
     
 
 
 
Systemic
 
  1. Capacity to apply theoretical concepts in practice
 
 
 
 
 
  1. Understanding the basic security concepts: attacks, services, mechanisms and models
  2. Knowledge of basic concepts in modular arithmetics
  3. Understanding the classical symmetric-key encryption techniques. In particular: Caesar, general mono-alphabetic, Playfair, Hill, and poly-alphabetic ciphers
  4. Understanding the modern block and stream ciphers, in particular DES and RC4 respectively
  5. The ability to compare and analyze different encryption techniques
  6. Ability to choose the encryption techniques that suit best a given situation
  7. Understanding different block cipher modes of operation and their purpose
  8. Understanding the public-key cryptography and the RSA algorithm
  9. Understanding the concept and techniques for secret and public key sharing and the pros and cons of each technique
  10. Understanding hash functions and message authentication codes
  11. Understanding the difference between message authentication and signature, and different methods to implement them
 
Grading
 
General grading criteria
 
 The students in this course will be evaluated based on their performance in the following activities:
 
  1. Continuous Evaluation
    1. homework(15%)
      • distributed weekly
      • in group
      • corrected in class
    2. Quizzes (15%)
      • taken weekly
      • in group
    3. Project (7.5%)
      • 1 throughout the trimester
      • done individually
    4. Course Wiki (7.5%)
      • every letcture is to be summarized in a wiki by one or more groups (to be determined)
      • in group
    5. In-class positive and negative bonus points
      • worth 0.1 points each, added (subtracted) directly to (from) the total final grade
      • given (taken) based on in-class behavior and performance
      • does not help passing the course if your final exam is below minimum required
  2. Partial and Final Evaluation
    1. Exams
      • 1 midterm exam (15%)
      • final exam (40%) - minimum 4.0 required for passing the course
      • September exam - see below for explanation
      • all exams are carried out individually
  
 

At the beginning of the trimester, the students are asked to organize themselves into groups of two or three students. These groups will remain together for the duration of the trimester.

Homework:

For every homework assignment, each group is required to turn in one completed assignment which is solved by participation of all members of the group. The homework should be delivered at the beginning of each seminar session. All individuals in the group will get the same grade for every homework.

Occasionally, you may be asked fo help with the grading process of the homeworks in seminar classes.

Quiz:

For each quiz, one individual per group is randomly chosen who will serve as the representative of the group. The chosen individuals will participate in the quiz, and the grade that they get will be assigned to the rest of the members of their group. This way the students are encouraged to work together in the homework and make sure that all individuals in their group equally participate in solving the homework. They will also help each other learn the concepts when solving homework.

Bonus points:

The in-class positive bonus points are given to individuals for participation and exceptionally good performance in the class activities. The negative points are given to individuals who show exceptionally disruptive behavior in class, or refuse to participate in certain class activities.

Exams:

The midterm exam will be taken around the middle of the trimester. It will include some multiple choice and some analytical questions.

The final exam will also include both multiple choice and analytical questions. The students will be individually evaluated in the exam. A minimum grade of 4.0 (out of 10) on the final exam is required for passing the course.

The evaluation method is summarized in the following table:

Component

Grading impact

Grading agent

Grouping

%

Mandatory

Optional

Faculty

Self

Mutual

Indiv

S. Group

Homework (H)

x

x

x

x

15

Quizzes (Q)

x

x

x

15

Project (P)

x

x

x

7.5

Wiki (W)

x

x

x

x

7.5

Midterm Exam (M)

x

x

x

15

Final Exam (F)

x

x

x

40

Students will pass the course if they meet the minimum of 4.0 required for their final exam grade and their Total grade (as calculated above) is at least 5.0. In other words if:

Students who have a Total grade greater than 5.0, but don't pass the course because they don't meet the minimum requirement for the final exam grade will receive a final grade of 4.9. Otherwise, the final grade will be equal to the Total grade.

September exam: Students who do not pass the course in the end of the trimester have the opportunity to pass the course in September. The final grade in this case is calculated as follows:

For passing the course in September it is required that your grade in September exam is at least 4 (S ≥ 4). If Final grade ≥ 5 but S < 4, the Final grade will be reduced to 4.9.

  • Review of number theory and modular arithmetics

  • Introduction to cryptography and network security

  • Symmetric cryptography

    • Classical techniques

    • Modern techniques

    • Confidentiality using symmetric encryption

    • Symmetric key management

  • Public-key cryptography and hash functions

    • Public-key cryptography and RSA

    • Public key management

  • Message authentication codes

  • Hash functions

  • Digital signatures

Methodology

Methodological Focus

This course is worth a total of 4.5 credit units (3.6 ECTS), which require 90 hours of effort per student. Out of these, 33 hours correspond to class attendance and the rest to either individual or group work. The 33 hours of attendance break down into:

  • 20 hours of lectures.

  • 13 hours of seminars.

The lecture sessions, which will be attended by all the students registered to the course, are dedicated to introducing the theoretical concepts for each topic covered in the course. The lecture sessions will be held once a week and each last two hours.

The seminars, for which the students are divided into 3 groups of less than 15 students each, will consist of 80-minutes long sessions held once a week (for each group). The main focus of the seminar sessions will be on practicing the theoretical concepts taught in the lecture sessions. This will be done by various means, including correcting homework, doing quizzes and solving them in class, and occasionally holding contests related to the topics discussed in class.

The remaining 57 hours are left to students to spend at home on homework, studying, and doing the projects.

Note: This year there are only 9 Wednesdays in the trimester. As the seminars are held on Wednesdays, only 12 hours of the aforementioned 13 hours will be feasible. The extra hour will be spent on other activities.

Learning Resources and Bibliography

Basic bibliography

  • William Stallings. Cryptography and Network Security: Principles and Practices, 4th Edition. Prentice Hall.

This book has a Student Resources website which contains useful links related to the material covered in the course. Make sure to check it out at

http://williamstallings.com/Crypto/Crypto4e.html

Complementary bibliography

  • Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone Handbook of Applied Cryptography CRC Press.

    This book is available for free at

    http://www.cacr.math.uwaterloo.ca/hac/

  • C. Kaufman, R. Perlman and M. Speciner. Network Security: Private Communications in a Public World. Prentice Hall

Other recommended reading

The following lecture notes by Prof. Christof Paar, from Ruhr-Universitat Bochum, can be very useful, especially when the students don't have access to the main reference of the course.

http://www.box.net/shared/static/76vk1rd49n.pdf

Teaching material

  • Lecture notes taken by students in class

  • Lecture slides delivered via Moodle.

  • Handouts delivered via Moodle.

  • Quizzes and tests

Activity Program

Week

Session Activity

/ Type of Activity

Homework Activity

/ Type of Activity

Week 1

Seminar (1h 20m):

- review of modular arithmetic.

- group practice of problems on modular arithmetic.

Lecture (2h):

- Introduction to security concepts: attacks, services, mechanisms, and models.

- Overview of the course

- Symmetric encryption: rules of the game, classifications

Homework on theoretical topics discussed (2h)

Recommended reading, and studying for the quiz (2h)

Summarizing the lecture in the course Wiki in Catalan or Spanish. Done by two groups per week (5h/student/term)

Week 2

Seminar (1h 20m):

- discussion of homework problems

- quiz

- practicing the theoretical concepts taught in previous lecture

Lecture (2h):

Classical encryption techniques

Homework on theoretical topics discussed (2h)

Recommended reading, and studying for the quiz (2h)

Week 3

Seminar (1h 20m):

- discussion of homework problems

- quiz

- practicing the theoretical concepts taught in previous lecture

Lecture (2h):

- Modern block ciphers

- DES

Homework on theoretical topics discussed (2h)

Recommended reading, and studying for the quiz (2h)

Week 4

Seminar (1h 20m):

- discussion of homework problems

- quiz

- practicing SDES

Lecture (2h):

- DES properties

- Attacks on block-ciphers

Homework on theoretical topics discussed (2h)

Recommended reading, and studying for the quiz (2h)

Week 5

Seminar (1h 20m):

- review and preparation for midterm exam

- practicing the theoretical concepts taught in previous lecture

- Project handed out

Lecture (2h):

- Stream ciphers and RC4

- Midterm exam

No homework!

No quiz!

Studying for the midterm(4h)

Week 6

Seminar (1h 20m):

- discussion of homework problems

- discussion of midterm exam

Lecture (2h):

- Confidentiality using symmetric encryption

- key distribution

- random number generators

Homework on theoretical topics discussed (2h)

Recommended reading (1h)

No quiz!

Working on the project (6h)

Week 7

Seminar (1h 20m):

- discussion of homework problems

- quiz

- practicing the theoretical concepts taught in previous lecture

- project 1 collected

Lecture (2h):

Public-key cryptography and RSA

Homework on theoretical topics discussed (2h)

Recommended reading, and studying for the quiz (2h)

Week 8

Seminar (1h 20m):

- discussion of homework problems

- quiz

- practicing the theoretical concepts taught in previous lecture

Lecture (2h):

- Key management

- other public key cryptosystems

- Discussion on project 2

Homework on theoretical topics discussed (2h)

Recommended reading, and studying for the quiz (2h)

Week 9

Seminar (1h 20m):

- discussion of homework problems

- quiz

- practicing the theoretical concepts taught in previous lecture

Lecture (2h):

- Message Authentication and Hash functions

Homework on theoretical topics discussed (2h)

Recommended reading, and studying for the quiz (2h)

Week 10

Seminar (0h):

- The seminars are held on Wednesdays and there are only 9 Wednesdays this trimester (that means 1 hour less than usual)

Lecture (2h):

- Digital Signatures and Authentication Protocols

- review of the entire course

Homework on theoretical topics discussed (2h)

Recommended reading, and studying for the quiz (2h)

Exam week

Final Exam

Studying for final exam (8h)

Total Time spent per student

In class: 32 hours

At home: 58 hours

Objectius
En aquesta assignatura es presenten els principis bàsics del xifrat d'informació i el seu ús en sistemes de seguretat de les telecomunicacions

Temari
Part 1. Introducció a la Criptografia i Seguretat en Xarxes
- Conceptes bàsics de criptografia i seguretat en xarxes

Part 2. Criptografia simètrica
- Tècniques clàssiques d'encriptació
- Cifratge de blocs i DES
- Cifratge de fluxe i RC4
- Confidencialitat amb criptografia convencional

Part 3. Criptografia de Clau Pública i Funcions Hash
- Criptografia de clau pública i RSA
- Gestió de claus
- Autenticació de Missatges i Funcions Hash
- Signatura Digital i protocols d'Autenticació

Avaluació
Examen final: 60%
Examen parcial (13 Febrer): 20%
Pràctiques: 20%

Bibliografia Bàsica
William Stallings, Crytpography and Network Security, Third Editon. Prentice Hall 2a - 3a edició

Bibliografia Complementària
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone Handbook of Applied Cryptography CRC Press. Online available at http://www.cacr.math.uwaterloo.ca/hac/
C. Kaufman, R. Perlman and M. Speciner. Network Security: Private Communications in a Public World. Prentice Hall