2. Cypher, digital signature and hash algorithms
|
- Encrytion. Shannon principles. Stream and block cyphers. DES and AES algorithms Cypher modes of operation
- Integrity and hash algorithms.
- Public key cryptosystems. RSA, ElGamal and DSA.
|
4. Authentication and key agreement protocols.
|
- Authentication methods.
- Threats to an authentication protocol. Countermeasures.
- Requirements of a key agreement protocol. Diffie-Hellman protocol.
- Authentication in simmetric cryptosistems. Cases of study: GSM and Kerberos.
- Authentication in asimetric cryptosistems. Cases of study: X509 and SSL.
- Passwords based protocols: SRP.
|
6. Security in the Web and electronic commerce. |
- Problems of security in the Web.
- Protocols: SSL and TLS.
- Certification in the Web.
- Principles of electronic commerce and payment protocols. PayPal system.
|
8. Systems Security. |
- Firewalls and systems against intrusions.
- Malicious software and networks. Botnets.
- Forensic analysis of systems.
|