2. Cypher, digital signature and hash algorithms
|
- Types of criptosistems and algorithms.
- Integrity and hash algorithms.
- Symetric key cryptosistems. Mac functions. Encrytion. Shannon principles. Stream and block cyphers. DES and AES algorithms Cypher modes of operation.
- Public key cryptosystems. RSA, DSA and elliptic curves.
- Influence of quantum computing on cryptography.
|
4. Authentication and key agreement protocols.
|
- Authentication methods.
- Threats to an authentication protocol. Countermeasures.
- Requirements of a key agreement protocol. Diffie-Hellman protocol.
- Authentication in simmetric cryptosistems. Cases of study: GSM and Kerberos.
- Authentication in asimetric cryptosistems. Cases of study: X509 and SSL.
- Passwords based protocols: SRP, SAE.
- Single Sign On (SSO)
|
6. Security in the Web and electronic commerce. |
- Problems of security in the Web.
- Protocols: SSL and TLS.
- Certification in the Web.
|
8. Systems Security. |
- Firewalls and systems against intrusions.
- Malicious software and networks.
- Forensic analysis of systems.
|