Pervasive use of interconnected computer systems and the diversity of threats on open networks have made the infrastructure security a major issue.
This course presents the main aspects to consider to build a distributed computing system running safely, even in open environment (ie in the presence of random errors and / or malicious attacks).
The focus is on:
Part 1. Coding technologies for communications integrity :
1. Introduction: presentation of basic technologies in cryptology. Symetric encryption (OTP, AES). Asymetric encryption (ECDLP/El Gamal). One-way hash functions and pseudo-random generators.
2. Error detection in networks - CRC coders and decoders (LFSR circuits). Examples (Ethernet and GSM).
3. Error-correcting codes (interpolation). Reed-Solomon coding and decoding. Application.
4. Error bursts and interleaving. Applications: CIRC code for CDs and DVDs; RAID disk systems.
5. Application to correlation attacks. Example: Siegenthaler sur GSM.
Part 2 : Applied security and attacks
1. Web applications anc network security.
2. Key sharing and PKI architecures.
3. Overflows and Shellcode
4. Fuzzing of protocols
5. Research: advances in test of protocols security.
2 written exams, 1h30 each.
Mark = 2/3 (ET1+ET2) + 1/3 (TP/EO)
Workload: 36 hours lectures + 21h homework + 3h exam = 60 h
1 examen de 2h
Note = 2/3 (ET) + 1/3 (TP)
ET = Examen Theorique
TP = Travail Individuel en binôme (note = Exposé Oral + Conpte-rendu écrit)
Charge de travail totale : 36 heures encadrées + 22h travail personnel + 2h examen = 60 h
Date of update January 15, 2017