Docente
|
D'AMORE FABRIZIO
(programma)
Parte I. Sistemi distribuiti - Introduzione ai sistemi distribuiti - Astrazioni di base (Computazioni distribuite, astrazione di processi, Astrazione delle comunicazioni, Assunzioni di sincronia, Astrazione del Tempo) - Sincronizzazione dei clock fisici - Comunicazione Broadcast (Best Effort Broadcast, Broadcast affidabile, Broadcast uniforme e affidabile, Broadcast probabilistico) - Consenso (Consenso regolare, Risultato di Impossibilità FLP, Consenso uniforme, Algoritmo di Paxos) - Primitive di comunicazione ordinate - Memorie condivise - Replicazione software - CAP Theorem e le sue applicazioni - Tolleranza a guasti Bizantini - Sistemi - Publish/subscribe - Distributed Ledgers
Parte II. Computer and network security Information security and cybersecurity. Cryptography and its role for the information security. Communication model, attack models, adversarial models. Terminology. Symmetric cryptography: perfect cyphers, stream ciphers (Vernam), block ciphers. Review on discrete mathematics: modular arithmetic, groups, fields, Galois fields; Fermat and Euler theorems. Rijndel and AES. Modes of operations. Key whitening, 3DES. MAC techniques: CBS-MAC, unkeyed hashing, keyed hashing. Birthday attack. SHA families. HMAC. Public key cryptography: Diffie-Hellman and its security; details on RSA; attacks to RSA; real RSA. Cryptographically secure pseudo-random number generators. Authentication and non-repudiation: digital signatures. ElGamal, DSS. Authentication: challenge-respinse models, trusted third parties, Needham-Schroeder, Kerberos, digital certificates (X509) and certificate authorities. Lamport hashes and one-time passwords. EKE family. Security protocols: IPsec, TLS, SSH. Firewalls: classifications and examples. Iptables. Secret sharing (Shamir). Access control: DAC vs. MAC models. HRU, BLP.
 Parte I. Sistemi distribuiti Testi adottati - C. Cachin, R. Guerraoui and L. Rodrigues. Introduction to Reliable and Secure Distributed Programming, Springer, 2011
Suggeriti - George Coulouris, Jean Dollimore and Tim Kindberg, Gordon Blair "Distributed Systems: Concepts and Design (5th Edition)". Addison - Wesley, 2012.
Parte II. Computer and network security Textbook Charlie Kaufman, Radia Perlman, Mike Speciner. Network Security: Private Communication in a Public World, 2/E. ISBN-10: 0130460192 • ISBN-13: 9780130460196 ©2002 • Prentice Hall • Cloth, 752 pp Published 01 May 2002
Other useful books/sources William Stallings. Cryptography and Network Security: Principles and Practice, International EditionPrinciples and Practice. 6th Edition Jun 2013, Book with access code, 756 pages ISBN13: 9780273793359 ISBN10: 0273793357 Ross J. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition ISBN: 978-0-470-06852-6, 1080 pages, April 2008 Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. Handbook of Applied Cryptography. ISBN: 0-8493-8523-7. Publisher: CRC Press, 2001 (old course)
|