Budapest University of Technology and Economics, Faculty of Electrical Engineering and Informatics

    Belépés
    címtáras azonosítással

    vissza a tantárgylistához   nyomtatható verzió    

    Security Protocols

    A tantárgy neve magyarul / Name of the subject in Hungarian: Biztonsági protokollok

    Last updated: 2015. november 22.

    Budapest University of Technology and Economics
    Faculty of Electrical Engineering and Informatics
    IT security minor specialization
    Course ID Semester Assessment Credit Tantárgyfélév
    VIHIMA05 1 2/1/0/f 4  
    3. Course coordinator and department Dr. Buttyán Levente, Hálózati Rendszerek és Szolgáltatások Tanszék
    4. Instructors Dr. Levente Buttyán    Associate Professor    HIT
    5. Required knowledge Coding Techniques (Cryptography)
    6. Pre-requisites
    Kötelező:
    NEM ( TárgyEredmény( "BMEVIHIM132" , "jegy" , _ ) >= 2
    VAGY
    TárgyEredmény( "BMEVITMM280" , "jegy" , _ ) >= 2
    VAGY
    TárgyEredmény( "BMEVITMM214" , "jegy" , _ ) >= 2
    VAGY
    TárgyEredmény("BMEVIHIM132", "FELVETEL", AktualisFelev()) > 0
    VAGY
    TárgyEredmény("BMEVITMM280", "FELVETEL", AktualisFelev()) > 0
    VAGY
    TárgyEredmény("BMEVITMM214", "FELVETEL", AktualisFelev()) > 0)

    A fenti forma a Neptun sajátja, ezen technikai okokból nem változtattunk.

    A kötelező előtanulmányi rendek grafikus formában itt láthatók.

    7. Objectives, learning outcomes and obtained knowledge This course aims at (i) introducing problems related to communication security in wired and wireless networks, (ii) describing the principles and practical implementations of modern security protocols that address those problems, and (iii) sheding light on protocol design issues through the detailed analysis of existing security protocols.
    8. Synopsis Motivation and basic notions (1 hour)
    Attacker models and examples for attacks. Conventional communication security objectives  (confidentiality, authenticity, integrity, non-repudiation, anonymity, prevention of traffic analysis). Placement of security services in the network protocol stack.

    Overview of cryptographic primitives (2 hours)
    Main properties of encryption algorithms, hash functions, asymmetric key schemes,  and practical considerations related to cryptographic parameters.
     
    Basic protocols (4 hours)
    Introduction, analysis, and practical applications of the main block encryption modes. Introduction, analysis, and practical applications of some known MAC function constructions. Asymmetric key encryption and digital signature in practice, related PKCS standards, elliptic curve cryptography.  

    Random number generation (1 hour)
    True and pseudo random number generators, and measuring their quality. Attack models and known attacks against random number generators. Design requirements for pseudo random number generators, illustrative examples.
     
    Cryptographic (program) libraries (1 hour)
    Introduction of some known cryptographic libraries (e.g., OpenSSL) and illustration of their usage in practice through examples.

    Analysis and design of key exchange protocols (2 hours)
    Goals, types, and main services of key exchange protocols. Typical mechanisms, design patterns and considerations. Manual analysis of some known protocols, introduction of typical attack methods. Formal modeling and analysis of key exchange protocols with the Proverif analysis tool.

    Public Key Infrastructure (PKI) (2 hours)
    Definition of the terms certificate, certificate chain, and Certification Authority. Introducing the elements, functions, and processes in a PKI through the life-cycle of a certificate and in relation to the X.509 standard.  Key management issues and certificate revocation mechanisms. Legal background of PKI and electronic signatures.
     
    Secure communication protocols (8 hours)
    •    Operation and analysis of some known security protocols (SSL/TLS, IPsec, 802.1AE (MACsec), 802.1X, 802.11):
    •    SSL/TLS (3 hours): SSL/TLS subprotocols, detailed description of the TLS handshake and TLS record protocols, known weaknesses and attacks, lessons learned and identification of protocol design principles  
    •    IPsec (1 hour): operation of the AH, ESP, and IKEv2 protocols, examples for IPsec applications
    •    802.1X and 802.11 security (3 hours): operation and analysis of the WEP, WPA1, WPA2 protocols, attacks against WEP and WPA1, lessons learned and identification of protocol design principles
    •    802.1AE (1 hour): operation and application examples

    Practical authentication protocols (2 hours)
    Known authentication and authorization protocols (Kerberos, SAML and OAuth), operation and analysis.

    Security protocols in resource constrained environments (2 hours)
    Bluetooth security. Key exchange and secure communications in wireless sensor networks. Security and privacy in RFID systems.

    Security protocols for cloud based services (2 hours)
    Secure data storage in the cloud, computing with encrypted data.

    Protocols for anonymous communication (1 hour)
    Defining and quantifying anonymity. Mix networks. Operation of the Tor network, as a practical implementation of the Mix concept.

    Classroom exercises extend the lectures by illustration of the usage of concrete security tools, and help deepening knowledge by solving challenges in the following domains:  
    1. block encryption modes: exercises related to the properties of the different block encryption modes
    2. MAC constructions: exercises related to the properties of MAC functions
    3. random number generation: exercises related to the properties of random number generators
    4. usage of crypto libraries: illsutration of the usage of some known crypto libraries (e.g., OpenSSL) through examples
    5. analysis and design of key exchange protocols: challenges related to attacking and fixing key exchange protocols
    6. security protocols for cloud based services: illustration of design principles and practical implementation issues using Tresorit as an example
    7. analysis of anonymous communication systems: exercises to calculate the level of anonymity in some anonymous communication systems

    9. Method of instruction Lecture and classroom exercises.
    10. Assessment Fulfilling the requirements of 2 homework projects (HW1, HW2) and a test (T). Final grade is calculated as 0.2*HW1 + 0.2*HW2 + 0.6*T (rounded to the closest integer)
    11. Recaps

    12. Consultations Ad hoc meetings with the lecturer.
    13. References, textbooks and resources
    Slides are available on the course web site with further recommended readings.
    14. Required learning hours and assignment
    Kontakt óra42
    Félévközi készülés órákra 
    Felkészülés zárthelyire48
    Házi feladat elkészítése30
    Kijelölt írásos tananyag elsajátítása 
    Vizsgafelkészülés 
    Összesen120
    15. Syllabus prepared by Dr. Levente Buttyán    Associate Professor    HIT