Stampa la pagina Condividi su Google Condividi su Twitter Condividi su Facebook Lecturer info

ZAPPONE ALESSIO - Ricercatore a tempo determinato Legge 240/10

Italian version

Department: Dipartimento: Ingegneria Elettrica e dell'Informazione "Maurizio Scarano"

Scientific Sector: ING-INF/03

Contact info:
Tipo: Dati

  • Teaching CRYPTOGRAPHY AND CYBERSECURITY (92359)

    Secondo anno di Ingegneria Informatica (LM-32), Generale
    Credits (CFU): 6,00

    Program:
    1. Introduction to Cryptography
    1.1 Historical roots of cryptography.
    1.2 Unconditional and computational security.
    1.3 Mono-alphabetic cyphers.

    2. Symmetric cryptography.
    2.1 Block and stream ciphers.
    2.2 Data Encryption Standard
    2.3 Double DES and Triple DES.
    2.4 Advanced Encryption Standard.
    2.5 Modes of operation of block cyphers.

    3. Fundamentals of finite fields
    3.1 Galois fields.
    3.2 Modular and polynomial arithmetic.
    3.3 Fermat’s theorem and Euler’s Theorem.
    3.4 Primitive roots and discrete logarithms.

    4. Asymmetric Cryptography
    4.1 General discussion on the asymmetric approach.
    4.2 RSA algorithm

    5. Key management and distribution
    5.1 Symmetric approaches
    5.1.1 Key Distributions Centers
    5.1.2 Needham-Schroeder Protocol
    5.2 Asymmetric approaches
    5.1.1 Certification of public keys
    5.1.2 Diffie-Hellman key exchange


    6. Authentication and Integrity
    6.1 Digital signatures
    6.2 Digital signature standard
    6.3 MAC and Hash functions
    6.4 Secure Hash Algorithm
    6.5 Hashed MAC Algorithm
    6.6 Digital certificates

    7. Physical-layer security
    7.1 Definition of Secrecy Capacity.
    7.2 Gaussian Wire-tap Channel: SISO, MISO and multi-carrier.

    Reference books:
    W. Stallings “Cryptography and Network Security”, 4th Edition, Prentice Hall

  • Teaching CRYPTOGRAPHY AND CYBERSECURITY (92359)

    Secondo anno di Telecommunications Engineering (LM-27), Curriculum unico
    Credits (CFU): 6,00

    Program:
    1. Introduction to Cryptography
    1.1 Historical roots of cryptography.
    1.2 Unconditional and computational security.
    1.3 Mono-alphabetic cyphers.

    2. Symmetric cryptography.
    2.1 Block and stream ciphers.
    2.2 Data Encryption Standard
    2.3 Double DES and Triple DES.
    2.4 Advanced Encryption Standard.
    2.5 Modes of operation of block cyphers.

    3. Fundamentals of finite fields
    3.1 Galois fields.
    3.2 Modular and polynomial arithmetic.
    3.3 Fermat’s theorem and Euler’s Theorem.
    3.4 Primitive roots and discrete logarithms.

    4. Asymmetric Cryptography
    4.1 General discussion on the asymmetric approach.
    4.2 RSA algorithm

    5. Key management and distribution
    5.1 Symmetric approaches
    5.1.1 Key Distributions Centers
    5.1.2 Needham-Schroeder Protocol
    5.2 Asymmetric approaches
    5.1.1 Certification of public keys
    5.1.2 Diffie-Hellman key exchange


    6. Authentication and Integrity
    6.1 Digital signatures
    6.2 Digital signature standard
    6.3 MAC and Hash functions
    6.4 Secure Hash Algorithm
    6.5 Hashed MAC Algorithm
    6.6 Digital certificates

    7. Physical-layer security
    7.1 Definition of Secrecy Capacity.
    7.2 Gaussian Wire-tap Channel: SISO, MISO and multi-carrier.

    Reference books:
    W. Stallings “Cryptography and Network Security”, 4th Edition, Prentice Hall

  • Teaching RETI WIRELESS (93365)

    Terzo anno di Ingegneria Informatica e delle Telecomunicazioni (L-8), Curriculum unico
    Credits (CFU): 6,00

Prenotazione appello

E' possibile prenotarsi ad un appello d'esame, collegandosi al portale studenti.

Elenco appelli d'esame disponibili

    Al momento non ci sono appelli disponibili.

[Ultima modifica: mercoledì 30 novembre 2016]