Academic Year:
2017/18
533 - Master's Degree in Telecommunications Engineering
Teaching Plan Information
Academic Year:
2017/18
Subject:
60929 - Advanced security and management
Faculty / School:
110 - Escuela de Ingeniería y Arquitectura
Degree:
533 - Master's Degree in Telecommunications Engineering
ECTS:
5.0
Year:
1
Semester:
Second semester
Subject Type:
Compulsory
Module:
---
5.1. Methodological overview
The methodology followed in this course is oriented towards achievement of the learning objectives. A wide range of teaching and learning tasks are implemented, such as lectures where the main course contents are presented and discussed, computer lab sessions, and student participation.
5.2. Learning tasks
The course includes the following learning tasks:
- A01 Lectures (25 hours). The main theoretical contents are presented and student participation is encouraged.
- A02 Practice session (5 hours). Students solve example problems and cases during the classes.
- A03 Computer lab sessions (20 hours). 10 sessions of two hours each will be held in a computer network laboratory. Instructions for each computer/lab session where the different activities are planned will be available before the session. The students will present the results obtained during each one of the practical units once finished.
- A05 Assignment (10 hours). It helps acquire all proposed learning outcomes, especially those related to autonomous work skills and the ability to communicate oral and written conclusions.
- A08 Assessment (3 hours). A set of theoretical-practical written tests and reports or papers. Details can be found in the "Assessment" Section.
5.3. Syllabus
The course will address the following topics:
Section 1. Advanced Security
- Introduction
- 1.1 Computational complexity
- 1.2. The Game-playing Technique
- Block Ciphers
- Pseudorandom Functions
- Symmetric Encryption
- Hash Functions
- Message Authentication Codes
- Authenticated Encryption
- Stream Ciphers and Pseudorandom Generators
- Number Theoretic Primitives
- Asymmetric Encryption
- Digital Signatures
- Key Distribution
- Applications and Protocols
Section 2. Advanced Management - SNMPv3 secure management architecture
- Architecture, security and management
- Message processing and delivery
- SNMPv3 applications
- User-based security model
- View-based Access Control model
5.4. Course planning and calendar
Further information concerning the timetable, classroom, office hours, assessment dates and other details regarding this course, will be provided on the first day of class or please refer to the EINA website.
5.5. Bibliography and recommended resources
- Kurose, James F.. Computer networking : a top-down approach / James F. Kurose, Keith W. Ross ; international edition adapted by Bhojan Anand . - 4th ed. Boston : Pearson, cop. 2008
- Pastor Franco, José. Criptografía digital : fundamentos y aplicaciones / José Pastor Franco, Miguel Angel Sarasa López, José Luis Salazar Riaño . - 2a. ed. Zaragoza : Prensas Universitarias de Zaragoza, 2001
- Menezes, Alfred J.. Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone . - [1st ed.] Boca Raton [etc.] : CRC, cop. 1997
- Goldreich, Oded. Foundations of Cryptography, Basic Tools / Oded Goldreich Cambridge University Press, 2001
- Goldreich, Oded. Foundations of Cryptography, Basic Applications / Oded Goldreich Cambridge University Press, 2004
- Goldreich, Oded. Computational Complexity / Oded Goldreich Cambridge University Press, 2008
- Katz, Jonathan. Introduction to Modern Cryptography / Jonathan Katz, Yehuda Lindell Chapman and Hall/CRC, 2008
- Subramanian, Mani. Network Management: Principles and Practices / Mani Subramanian. - 2nd ed. Prentice Hall, 2012