Secure Communications

Објавено: October 12, 2018
  1.    Course Title Secure Communications
  2.    Code 3ФЕИТ10З032
  3.    Study program TKII
  4.    Organizer of the study program (unit, institute, department) Faculty of Electrical Engineering and Information Technologies
  5.    Degree (first, second, third cycle) First cycle
  6.    Academic year/semester IV/7   7.    Number of ECTS credits 6.00
  8.    Lecturer Dr Aleksandar Risteski
  9.    Course Prerequisites

10.    Course Goals (acquired competencies):  Knowledge of cryptographic techniques, algorithms and protocols; historical development, modern trends and their application in different applications. Introducing the concepts of network security and providing reliable communications across different types of communication networks and systems.

11.    Course Syllabus: Introduction. The need for secure communications. Basic concepts and concepts for providing reliable communications. Basic notions of crypto-analysis. Types of security attacks. Classical symmetric encryption. Historical review. Block encryption. DES. Modes of operation of block codes. AES. Security of symmetric encryption algorithms. Asymmetric encryption. Public key algorithms. RSA. Elliptic curve cryptography. Information integrity and authentication. One-way (hash) functions. Digital signature. Digital certificate. PGP. Quantum cryptography. QKD. Application of quantum computers in crypto-analysis. Basic concepts of network security. Basic security services. Security management. Assessment of security risks. Security mechanisms at OSI layers. IPsec. SSL, TLS. Virtual Private Networks (VPN) based on security mechanisms. Security mechanisms in WiFi. Security mechanisms in WiMAX. Security mechanisms in mobile networks (GSM, UMTS). Security mechanisms in 4G mobile networks (LTE) and IMS. Reliability of cloud services. Future security trends (5G). Security mechanisms in personal networks (Bluetooth, ZigBee). Intrusion Detection and Prevention Systems (IDS, IPS).

12.    Learning methods:  Lectures, tutorial and laboratory classes, individual student projects and seminar works.
13.    Total number of course hours 3 + 1 + 1 + 0
14.    Distribution of course hours 180
15.    Forms of teaching 15.1. Lectures-theoretical teaching 45
15.2. Exercises (laboratory, practice classes), seminars, teamwork 30
16.    Other course activities 16.1. Projects, seminar papers 20
16.2. Individual tasks 20
16.3. Homework and self-learning 65
17.    Grading 17.1. Exams 10
17.2. Seminar work/project (presentation: written and oral) 20
17.3. Activity and participation
17.4. Final exam 70
18.    Grading criteria (points) up to 50 points     5 (five) (F)
from 51 to 60 points     6 (six) (E)
from 61 to 70 points     7 (seven) (D)
from 71 to 80 points     8 (eight) (C)
from 81 to 90 points     9 (nine) (B)
from 91 to 100 points   10 (ten) (A)
19.    Conditions for acquiring teacher’s signature and for taking final exam Regular participation to lectures and tutorial classes and completion of all laboratory exercises.
20.    Forms of assessment During the semester, two partial written exams are taken (at the middle and at the end of the semester, with a duration of up to 90 minutes) and tests, which are conducted during the classes. Alternatively, instead of taking one of the partial exams, a seminar paper or project assignment (team or individual) can be prepared. The final grade includes points from the partial exams, tests and from the seminar paper or project assignment, if completed.
During the exam sessions, a written exam is taken (with a duration of up to 120 minutes) or one of the partial exams, if a seminar paper or project assignment has been prepared. The final grade includes points from the exam, tests and from the seminar paper or project assignment, if completed.
A special instruction published before each exam regulates the manner of taking the exam and the use of teaching aids and electronic devices during the exam
21.   Language Macedonian and English
22.    Method of monitoring of teaching quality Internal evaluation and polls.
23.    Literature
23.1. Required Literature
No. Author Title Publisher Year
1 P. Chandra Bulletproof Wireless Security Elsevier 2005
2 W. Stallings Cryptography and Network Security, Principles and Practices Prentice Hall 2011