IK2206 Internet Security and Privacy 7.5 credits

Säkerhet och datasekretess på internet

This course is about communicating securely over the Internet. By secure we mean: knowing who we are talking to, that no one has tampered with our messages and that no one can eavesdropped on our conversation. To do this we need the help of cryptography. Using the tools of cryptography we can construct protocols that fulfill our requirements.

Show course information based on the chosen semester and course offering:

Offering and execution

No offering selected

Select the semester and course offering above to get information from the correct course syllabus and course offering.

Course information

Content and learning outcomes

Course contents *

The course is based on a set of lectures and a project work. The lectures cover the following areas:

  • basics of cryptography and information theory, substitution, mono- and poly-alphabetic, home-phonic and, transposition ciphers
  • properties and implementation of block ciphers, modes of operations, properties of message digests and how to provide integrity
  • public-key encryption, RSA, Diffie-Hellman and, digital signatures
  • authentication of users, passwords, biometrics, hand shake to provide a private and integrity protected communication channel
  • communication protocols used on the Internet: Kerberos, IPsec, SSL, PKI etc.

In the project work the students will learn more about a particular technology or application domain such as bank security, link layer security, biometrics, quantum cryptography etc. Each student will write a short overview of the subject and prepare a tutorial presentation.

Intended learning outcomes *

The aim of the course is to give the students in depth knowledge of techniques used to create secure communication protocols. The students shall after the course be able to:

  • explain the principles behind encryption using shared keys
  • motivate the design principles for block ciphers
  • choose suitable modes of operations for block ciphers
  • explain the principles of message digests
  • use message integrity codes
  • explain the principles for public key encryption
  • choose appropriate techniques for authentication
  • explain the design of Internet standards such as: Kerberos, IPsec, SSL and PKI
  • evaluate a complex application and identify how security related issues are solved and how this will impact the security of the application.

Course Disposition

No information inserted

Literature and preparations

Specific prerequisites *

IK1203 Networks and Communications or equivalent. 

Knowledge in data communication and Internet technologies.

Recommended prerequisites

knowledge in data communication and Internet technologies

Equipment

No information inserted

Literature

There are two alternatives textbooks:

  1. Cryptography and Network Security: Principles and Practice, International Edition: Principles and Practice, 6/E. William Stallings. Pearson, 2013. ISBN-10: 0273793357, ISBN-13: 9780273793359.
  2. Network Security Essentials: Applications and Standards, International Edition: Applications and Standards, 5/E. William Stallings. Pearson, 2013. ISBN-10: 0273793365, ISBN-13: 9780273793366.

Note that for alternative 1. the chapters related to intrusion detection and firewalls are provided as online material. A six-month subscription for access to online resources is included with each book. Alternative 2. has only brief coverage of authentication, and needs to be complemented with other resourcees, including material from lectures.

Examination and completion

Grading scale *

A, B, C, D, E, FX, F

Examination *

  • PROA - Project, 1.5 credits, Grading scale: P, F
  • TENA - Examination, 4.5 credits, Grading scale: A, B, C, D, E, FX, F
  • UPGA - Assignment, 1.5 credits, Grading scale: P, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted

Examiner

Peter Sjödin

Further information

Course web

Further information about the course can be found on the Course web at the link below. Information on the Course web will later be moved to this site.

Course web IK2206

Offered by

EECS/Communication

Main field of study *

Computer Science and Engineering, Electrical Engineering

Education cycle *

Second cycle

Add-on studies

No information inserted

Contact

Peter Sjödin (psj@kth.se)

Ethical approach *

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Supplementary information

In this course, the EECS code of honor applies, see: http://www.kth.se/en/eecs/utbildning/hederskodex.