Learning outcomes

Following the course material, the student will be able to:
 
  • Understanding the basic concepts of modern cryptography and correctly applying them.
  • Threat modeling.
  • Understanding current recommendations for authentication protocols such as passwords based on Cryptanalyse strength of the adversary.
  • Recognising some software vulnerabilities and be able to exploit them in an educational setting.
  • Understanding some OS-level software defenses such as ASLR or NX bit.

 

Goals

The goal of this class is to cover the basic of information system security. The student will study techniques and principles belonging to modern cryptography, and their importance in today's protocol and system designs. We will study the cryptanalytic sciences as well, and will discuss applying it to authentication protocols based on some cryptographic principle. Eventually, if time permits, we will study software securty vulnerabilities. 

Content

The class introcudes some aspects of system security:

  • An introduction of symmetic crypto.
  • An introduction to authentication protocols.
  • An introduction to cryptanalyse.
  • An introduction to software security.

Assessment method

The evaluation will be oral, written or a mix of both.

Sources, references and any support material

Slides, book chapters and excercise sessions. Everything will be available within the course's platform.

Language of instruction

English