University of L'Aquila
(Click here) to get News|
Department of Information Engineering Computer Science and Mathematics
Academic Year 2018/2019
Information Systems and Network Security (6 CREDITS).
Link to the Computer Science Degree official website (click here).
This course provides an introduction to Information Systems and Network Security. Topics include:
- Basics of Cryptology.
- Game Theory for Network Security (if there is time)
- Introduction to Information Systems.
- Algorithmic Issues arising in Information Systems: Revenue Maximization Envy-Free Pricing Problems.
- Algorithmic Issues arising in Information Systems: Scheduling Algorithms; Envy-Free Scheduling.
First semester (September 17, 2018 - December 21, 2018), Wednesday: 11.30–13.30 (room A1.2) and Thursday: 9.30–11.30 (room 1.1)
After the lectures or by appointment. Given that I could be out of the office due to academic or research commitments,
students are invited to arrange the day and time of the meeting by e-mail and therefore to send an e-mail preventively.
Lecture notes (slides) provided by the lecturer. Plus the extra didactic material (please do not hesitate to contact me if you have problems with finding them).
Additional didactic material:
- Charlie Kaufman, Radia Perlman, Mike Speciner:
“Network Security: Private Communication in a Public World (2nd Edition)”. Prentice Hall, 2002.
- Peter Brucker: “Scheduling Algorithms”. Springer, 2007.
September 19, 2018: Presentation of the course. Slides (Click here).
Basics of cryptology: introduction (first part). Slides (Click here).
September 20, 2018: Basics of cryptology: introduction (second part). Slides (Click here).
September 26, 2018: Basics of cryptology: introduction (last part). Slides (Click here).
Symmetric cryptography: Stream ciphers (RC4), Block ciphers (Electronic codebooks(ECB), Cipher-block chaining (CBC), Output feedback (OFB), Counter (CTR). Slides (Click here).
September 27, 2018: Symmetric cryptography: Substitution-permutation (SP) networks, Feistel ciphers, (Data Encryption Standard (DES), 3DES, Advanced Encryption Standard (AES): an overview). Slides (Click here).
October 3, 2018: Exercises on columnar transposition ciphers, Vigenère cipher, Cipher-block chaining (CBC), Output feedback (OFB), Feistel cipher: Exercises solutions have been proposed on the blackboard.
October 4, 2018: Message Authentication Code (MAC), Hash functions. MD5 (very short overview) and SHA1 (overview). Slides (Click here)
October 10, 2018: Asymmetric cryptography: RSA cipher (first part) Slides (Click here).
October 11, 2018: Asymmetric cryptography: RSA cipher (second part) Slides (Click here).
October 17, 2018: Asymmetric cryptography: RSA cipher (last part), Diffie-Hellman cipher. Slides (Click here).
Exercises on Message Authentication Code (MAC), Applications of Hash functions, RSA cipher.
October 16, 2018: The Mid-term exam date is Wednesday November 7, time: 11.30-13.30, room A1.2.