Checking date: 30/03/2023

Course: 2023/2024

Basis for secure communication
Academic Program of Telecommunication Engineering via Bachelor in Telecommunication Technologies Engineering (Plan: 511 - Estudio: 252)

Coordinating teacher: MUÑOZ ORGANERO, MARIO

Department assigned to the subject: Telematic Engineering Department

Type: Compulsory
ECTS Credits: 6.0 ECTS


Requirements (Subjects that are assumed to be known)
Basic communication and network protocols concepts. In particular, it is recommended to have passed the following subjects: - Communications networks and services - Telematic Applications A basic knowledge of probability and algebraic structures is also needed, so knowledge of the following subjects if recommended: - Statistics
Summary: To have the knowledge, to be ablo to analyze and design and know how to apply to the resolution of specific problems, the main cryptographic techniques, as well as their applications to security systems in telematic networks and services. Students should familiarize themselves with symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, digital signatures and certificates, authentication protocols and their combined applications. Detail in terms of knowledge: - Know the generic environment of the cryptosystem together with the different agents that make it up. - Know the evolution of the different classic security mechanisms as a basis for modern security mechanisms. - Know the conventional encryption techniques (symmetric encryption) as well as the current encryption standard (AES) and the previous standard (DES). - Know the main modes of operation used in symmetric encryption. - To know the mathematical bases of the main mechanisms of public key encryption. Understand the RSA algorithm in depth. - Know the different hash techniques and their use in conjunction with public key algorithms to create digital signatures and digital certificates (PKI). - Know the different techniques of distribution of session keys, both based on public key and based on secret code. - Know the joint use of the different mechanisms by studying different security protocols (IPSec, SSL, etc.) Detail in terms of analysis, design and resolution of problems: - Ability to use the cryptosystem definition as a framework for comparing different security mechanisms to analyze communication systems and networks. - Ability to use the acquired criteria to evaluate the security of a given protocol. - Ability to analyze and know how to choose with criteria the most appropriate security algorithm in each circumstance and according to certain requirements. - Ability to define a security protocol for the resolution of a given scenario and providing security services. - Ability to use security tools that allow to apply the different mechanisms studied. - Be able to solve in couple a series of cryptographic challenges such as breaking passwords, determine from encrypted messages how to encrypt and certain parameters of the algorithms as well as generate certificates and digitally sign information. - Be able to understand recommendations about cryptographic standards. - Basic capabilities of cryptanalyzing systems
Skills and learning outcomes
Description of contents: programme
This is a basic and introductory subject to communication security covering the main technologies in order to create network security services and secure information transfer channels. The programme is divided into 4 parts: 1. Introduction to security. 1.1.What is Security? 1.2 Security Mechanisms. 1.3 Security Services. 1.4 Information Theory. 2. Symmetric Cryptography. 2.1 Classical cryptography algorithms. 2.2 Symmetric Encryption algorithms. 2.3 DES. TDES. AES. 2.4 Modes of operation. 2.5 Key distribution mechanisms. 3. Asymmetric Cryptography 3.1 Asymmetric cryptography algorithms. 3.2 Digital Signatures. 3.3 Digital Certificates (identity and attribute certificates). 4 Applications. 4.1 IPsec (Network level Security) 4.2 SSL/TLS (Security on TCP connections)
Learning activities and methodology
The learning activities and methodology include: - Theoretical lectures, problem solving classes in small groups, student presentations, individual tutoring and personal work of the student, including study, tests and exams; oriented to the acquisition of theoretical knowledge. - Laboratory practices and classes of problems in small groups, individual tutoring and personal work of the student, including study, tests and exams; oriented to the acquisition of practical skills related to the program of each subject.
Assessment System
  • % end-of-term-examination 55
  • % of continuous assessment (assigments, laboratory, practicals...) 45
Calendar of Continuous assessment
Basic Bibliography
  • A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press. August 2001
  • Mike Speciner; Radia Perlman; Charlie Kaufman. Network Security: Private Communication in a Public World. Prentice Hall. 2002
  • William Stallings. Cryptography and network security . Principles and Practice. Pearson Education M.U.A.. 2014
Recursos electrónicosElectronic Resources *
Additional Bibliography
  • Martti Lehto, Pekka Neittaanmäki. Cyber Security Power and Technology. Springer. 2018
  • Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu. Security and Privacy in Communication Networks: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22¿25, ... and Telecommunications Engineering. Springer. 2018
Recursos electrónicosElectronic Resources *
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN

The course syllabus may change due academic events or other reasons.

More information: