The course is connected to the following study programs

  • Cyber Security, Master’s Programme

Teaching language

English

Recommended prerequisites

IKT520-G Security in IoT and Machine-Type Communication, or equivalent. The course is related to IKT521-G Cryptography and cryptographic systems, and students should take this course in parallel.

Course contents

The course provides a theoretical introduction to communication security. A variety of authentication and key exchange protocols are covered, ranging from classic protocols to the most common protocols in-use today with the help of the cryptographic primitives discussed in IKT521-G Cryptography and Cryptographic Systems. Communication security protocols are discussed by considering how they relate to different layers in the OSI communication model. In addition, security protocols associate with 3GPP-based mobile systems are also explicitly covered, ranging from 2G/GSM systems to the most recent standard of 5G.

Learning outcomes

On successful completion of the course, students should:

  • have a good understanding about the security properties that must be taken into consideration when designing authentication protocols

  • have an advanced knowledge on how to design simple authentication and key-exchange protocols

  • have a thorough understanding on security measurers supported by the link-layer communication protocols (Bluetooth, Wi-Fi)

  • gain a deep understanding on the network layer security protocol – IPsec

  • have a sound knowledge on the transport layer security protocol – TLS, including its operation and associated properties

  • have a good understanding of the Extensible Authentication Protocol (EAP) framework and how it relates to application layer security

  • gain a comprehensive knowledge about the security protocols associated with 3GPP systems

Examination requirements

Compulsory assignments must be approved. Information about compulsory assignments will be given in Canvas at the start of the course.

Teaching methods

The course is given in the form of lectures, exercises and compulsory group work.

The total expected workload is estimated to be approximately 210 hours.

Evaluation

The person responsible for the course decides, in cooperation with student representative, the form of student evaluation and whether the course is to have a midway or end of course evaluation in accordance with the quality system for education, chapter 4.1.

Offered as Single Standing Module

Yes. Subject to availability or capacity.

Admission Requirement if given as Single Standing Module

Admission requirements for the course are the same as for the master’s programme in Cyber Security, the Security Technologies profile.

Assessment methods and criteria

Written examination, 3 hours. Graded assessment.

Last updated from FS (Common Student System) June 30, 2024 1:55:43 AM