Aller au menu Aller au contenu
Academics
Academics
Academics

> Study at Esisar > Engineering degree in Information Technology & Security

- 5AMSE500

A+Augmenter la taille du texteA-Réduire la taille du texteImprimer le documentEnvoyer cette page par mail cet article Facebook Twitter Linked In
  • Number of hours

    • Lectures : 15.0
    • Tutorials : -
    • Laboratory works : 12.0
    • Projects : -
    • Internship : -
    • Written tests : -
    ECTS : 2.5
  • Officials : Oum-El-Kheir AKTOUF

Goals

After the course, the student should be able to:

  • analyze the security needs of a communication and/or computation system;
  • use general knowledge about cryptographic primitives;
  • analyse the fitness of a secure solution with regards to cost and use constraints.

Content

  • Models for security analysis.
  • Shannon's theory, perfect security, Kerckhoff's principle.
  • Symmetric cryptosystems: design, make-up, analysis.
  • Other protocols and algorithms.
  • Asymetric cryptosystems.
  • Applications.

Prerequisites

Conditional probability.
Knowledge of Z/nZ (inverse elements, powers, primitive roots).

Tests

E1: written exam, session 1: 1h30 min. Documents and calculators can be used.
E2: oral exam, session 2: 30 min. Documents and calculators can be used.
TP: lab sessions evaluation.
P: presentation.

The exam is given in english only FR

Calendar

The course exists in the following branches:

see the course schedule for 2021-2022

Additional Information

Course ID : 5AMSE500
Course language(s): FR

The course is attached to the following structures:

  • Team Computer Science

You can find this course among all other courses.

Bibliography

  • Cryptography, a very short introduction – Fred Piper & Sean Murphy, Oxford.
  • Understanding cryptography – Christoph Paar & Jan Pelzl, Springer.
  • Codes and cryptography – Dominic Welsh, Oxford.
  • Cours de cryptographie – Gilles Zémor, Cassini.
  • Cryptographie : théorie et pratique – Douglas Stinson, Intl Thompson Pub.
  • Cryptography engineering – Neils Ferguson, Bruce Schneier & Tadayoshi Kohno,
    Wiley.
  • Handbook of applied cryptography – Alfred Menezes, Paul Van Orschoot, Scott
    Vanstone, CRC Press. (Disponible en ligne en intégralité)

A+Augmenter la taille du texteA-Réduire la taille du texteImprimer le documentEnvoyer cette page par mail cet article Facebook Twitter Linked In

Date of update June 25, 2015

Université Grenoble Alpes