Some knowledge of cryptology course.
Expected learning outcomes
The student shall gain insight into:
• why network security is important and why it should not be neglected
• which mechanisms are required and available for protection of networked systems
• how these mechanisms are used to solve security challenges in particular systems
The course will provide the student with the foundation required for implementing protection systems and for continuing research in the field.
Part I Introduction
• Network infrastructure and security threats
Part II Protection methods
• Encryption, device authentication, message authentication and protection of integrity.
• Key management: symmetric keys, public key infrastructure, certificates, revocation, and key escrows.
• Distributed access control
• Anatomy of attacks, firewalls, and protection against attacks
Part III Applications of security mechanisms
• Internet security (PGP, IPsec, NLS)
• Mobile security (GSM/UMTS architectures and security objectives, security functions of USIM, management of anonymity in mobile networks, use of USIM security to protect other systems)
• Non-repudiation (principles, collection of evidence, example of protocols)
• Payment systems (CyberCash, NetBill, Ecash)
Form(s) of Assessment
Form(s) of Assessment (additional text)
An overall evaluation is based on a 100 point scale, where the essay counts 50 points and the final exam (3 hours) counts 50 points. Conversion from 100 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale
Alphabetical Scale, A(best) – F (fail)
For the final exam: Ordinary re-sit examnination.
Available via Fronter.
Replacement course for