• Component

    École Nationale Supérieure d'Électrotechnique d'Électronique d'Informatique d'Hydraulique et des Télécommunications

Objectives

Introduction to basic concepts of computer systems security, in particular symmetric and asymmetric ciphering techniques, and their application to the development of authentication protocols. Introduction and illustration of discretionary and mandatory security policies, but also to intrusion tolerance techniques.

Read more

Description

The lecture is composed of four main sections:

– Introduction to basic concepts of computer security (classification of attacks, cryptography, evaluation)

– Illustration using basic examples (DES, RSA, Diffie-Hellmann, electronic signatures)

– Authentication and zero-knowledge authentication protocols (Needham-Schroeder, Fiat-Shamir, smartcards)

– Protection in computing systems (discretionary and mandatory security policies) and examples

The lecture concludes with notions of intrusion tolerance (Shamir threshold schemes, fragmentation-scattering).

Read more

Pre-requisites

Algorithmics, C / C++ programming

Read more

Additional information