IKT518 Security Protocols
- ECTS Credits:
- 7.5
- Responsible department:
- Faculty of Engineering and Science
- Course Leaders:
-
- Harsha Sandaruwan Gardiyawasam Pussewalage
- Ismail Ali Hassan
- Lecture Semester:
- Autumn
- Teaching language:
- English
- Duration:
- 1 term
The course is connected to the following study programs
- Cyber Security, Master’s Programme
Teaching language
EnglishRecommended prerequisites
IKT520-G Security in IoT and Machine-Type Communication, or equivalent. The course is related to IKT521-G Cryptography and cryptographic systems, and students should take this course in parallel.
Course contents
The course provides a theoretical introduction to communication security. A variety of authentication and key exchange protocols are covered, ranging from classic protocols to the most common protocols in-use today with the help of the cryptographic primitives discussed in IKT521-G Cryptography and Cryptographic Systems. Communication security protocols are discussed by considering how they relate to different layers in the OSI communication model. In addition, security protocols associate with 3GPP-based mobile systems are also explicitly covered, ranging from 2G/GSM systems to the most recent standard of 5G.
Learning outcomes
On successful completion of the course, students should:
-
have a good understanding about the security properties that must be taken into consideration when designing authentication protocols
-
have an advanced knowledge on how to design simple authentication and key-exchange protocols
-
have a thorough understanding on security measurers supported by the link-layer communication protocols (Bluetooth, Wi-Fi)
-
gain a deep understanding on the network layer security protocol – IPsec
-
have a sound knowledge on the transport layer security protocol – TLS, including its operation and associated properties
-
have a good understanding of the Extensible Authentication Protocol (EAP) framework and how it relates to application layer security
-
gain a comprehensive knowledge about the security protocols associated with 3GPP systems
Examination requirements
Compulsory assignments must be approved. Information about compulsory assignments will be given in Canvas at the start of the course.
Teaching methods
The course is given in the form of lectures, exercises and compulsory group work.
The total expected workload is estimated to be approximately 210 hours.
Evaluation
The person responsible for the course decides, in cooperation with student representative, the form of student evaluation and whether the course is to have a midway or end of course evaluation in accordance with the quality system for education, chapter 4.1.
Offered as Single Standing Module
Yes. Subject to availability or capacity.
Admission Requirement if given as Single Standing Module
Admission requirements for the course are the same as for the master’s programme in Cyber Security, the Security Technologies profile.
Assessment methods and criteria
Written examination, 3 hours. Graded assessment.