Page 1 of 1

Module Code - Title:

EE6032 - COMMUNICATION AND SECURITY PROTOCOLS

Year Last Offered:

2023/4

Hours Per Week:

Lecture

2

Lab

2

Tutorial

1

Other

0

Private

5

Credits

6

Grading Type:

N

Prerequisite Modules:

Rationale and Purpose of the Module:

Introduces students to security services and cryptographic protocols used for information and system security, in areas such as wireless networks, e-commerce and the Internet. Provides an understanding of security protocol design techniques and formal methods for evaluation of the reliability of security protocols.

Syllabus:

[Wireless Standards and Technologies] IEEE 802.11, WEP, Bluetooth, BlackBerry [Review Internet security] IPSec, SSL. [Role of security services in countering network attacks] confidentiality, data origin authentication, entity authentication, data-integrity, non-repudiation, access control, availability. [Cryptographic components] Review of the cryptographic components required in security protocols such as: ciphers & keys, hashing functions, random number generators, message authentication codes and digital signatures. [Public key infrastructures] X.509, SDSI, TLS. [Protocols] Key management, peer-to-peer distribution protocols, group distribution and identification protocols. Modern cryptographic protocols for: wireless communications (mobile, radio-link, secure mobile ad-hoc networks), e-commerce (e-payment, non-repudiation), Certified e-mail, E-voting. [Smart cards and protocols] for ATMs, passport identification and digital cash. [Security protocol design] Study of protocol design techniques [Use of formal methods] for evaluation of correctness of security of protocols.

Learning Outcomes:

Cognitive (Knowledge, Understanding, Application, Analysis, Evaluation, Synthesis)

Understand the operation of protocols in communication systems and security services Explain the use of security services in countering network attacks Identify suitable security protocols for services such as key distribution, authentication and non-repudiation Able to design custom security protocols to satisfy given security goals Apply formal methods to evaluate the correctness of security protocols Explain the differences between formal analysis tools based on modal logics and model checking

Affective (Attitudes and Values)

None

Psychomotor (Physical Skills)

None

How the Module will be Taught and what will be the Learning Experiences of the Students:

Lectures/Labs

Research Findings Incorporated in to the Syllabus (If Relevant):

Prime Texts:

W. Stallings & L.Brown (2018) Computer Security, Principles and Practice, 4th Ed. , Prentice Hall
W. Stallings & L.Brown (2014) Network Security, Principles and Practice, 6th Ed , Prentice Hall
C. Boyd & A. Mathuria (2003) Protocols for Authentication and Key Establishment , Springer

Other Relevant Texts:

M. Hendru (2001) Smart Card Security and Applications , Artech House
R. Temple & J. Regnault (2002) Internet and Wireless Security , Institution of Electrical Engineers
A. Danthine, G. Leduc, P. Wolper (1993) IFIP Transactions Protocol Specificaition, Testing, Verification , North-Holland
C. Gehrmann, J. Persson & B. Smeets (2004) Bluetooth Security , Artech House

Programme(s) in which this Module is Offered:

Semester - Year to be First Offered:

Spring - 09/10

Module Leader:

amrita.ghosal@ul.ie