Shared key cryptography. Perfect Ciphers according to Shannon, One-Time-Pad, unicity distance. Feistel ciphers. Public-key cryptography. Elements of modular arithmetic. RSA and El Gamal ciphers, the Diffie-Hellman protocol. Cryptographic one-way hash functions. Authentication and digital signature.
Elements of Information Theory. Compression codes: 1st Shannon theorem. Huffman codes. Noisy channels, capacity and error correction codes. Foundations of Privacy: k-anonymity, Differential Privacy.
Michele Boreale. Note per il corso di Codici e Sicurezza.
Notes available online.
Other textbooks:
Th. M. Cover, J.A. Thomas. Elements of Information Theory, 2 / E Wiley & Sons, 2006.
Learning Objectives
The course aims at providing students with a thorough understanding of the scientific principles underlying the efficient, reliable and secure processing and transmission of data.
Acquired skills.
At the end of the course, the student should be capable of building models at a high level, but rigorous, of communication systems, and of analyzing its criticalities from the point of view of Security.
Prerequisites
Fundamentals of: Algorithms and Data Structures, Computer Architecture, Discrete Mathematics and Logic Programming, Probability and Statistics.
Teaching Methods
Lectures in class (48 hours). Project assigments.
Further information
Office hours:
by appointment.
Dipartimento di Statistica, Informatica, Applicazioni
Viale Morgagni, 65 I 50134 Florence, Italy
Tel: +39 055 4237453
Fax: +39 055 4237436
e-mail: michele.boreale@unifi.it
Type of Assessment
Oral exam. Discussion of project assignments.
Course program
Crittografia a chiave condivisa. Cifrari perfetti secondo Shannon, One-Time-Pad, unicity distance. Cifrari di Feistel. Crittografia a chiave pubblica. Elementi di aritmetica modulare. I cifrari RSA e El Gamal, il protocollo di Diffie-Hellman. Funzioni hash one-way crittografiche. Autenticazione e firma digitale. Elementi di Teoria dell'Informazione. Codici di compressione: 1^ Shannon, codici Huffman. Canali con rumore, capacità.
Fondamenti della Privacy: k-anonymity, Differential Privacy.