Sécurité des Réseaux
Année Universitaire 2017-2018
The course of "Security of information systems". The course is principally based on the Book Cryptography And Network Security 4th Edition 2005 by William Stallings.
Voir Syllabus
Projects :
- Attaques réseaux avec arp-scan, arpspoof, ettercap, sslstrip, mitm attack (pdf)
- L'outil de scan puissant "nmap" (pdf)
- OpenPGP, GnuPG, thunderbird et enigmail, Mailvelope, plugins firefox et chrome sur la communication par messages chiffrés (pdf)
- Système de video surveillance en utilisant, ffmpeg, ffserver et OpenCV (pdf)
AU 2015-2016
Principally based on textbook Cryptography And Network Security 4th Edition 2005 by William Stallings.
This course is for the classes LFIG3, ECOM3 and TSI3
TDs
- TD classical and stream cipher Corrected
- TD Symmetric ciphers Corrected
Labs:
- Attaques réseaux avec arp-scan, arpspoof, ettercap, sslstrip, mitm attack (pdf)
- L'outil de scan puissant "nmap" (pdf)
- OpenPGP, GnuPG, thunderbird et enigmail, Mailvelope, plugins firefox et chrome sur la communication par messages chiffrés (pdf)
- Système de video surveillance en utilisant, ffmpeg, ffserver et OpenCV (pdf)
Pour Les 3ECOM, ci-joint le corrigé du DS Réseaux mobiles
AU 2014-2015
Principally based on textbook Cryptography And Network Security 4th Edition 2005 by William Stallings.
This course is for the classes LFIG3, ECOM3 and TSI3
- 02 October 2014 : Chapter 1: Introduction to security
keywords: attacks, security services, threats, DoS, spywares, virus, TCP flooding, ARP spoofing and flooding, DHCP starvation,..
Download it from here : chap1 (1 slide/page) or chap1 (4 slides/page)
- 09 October 2014 : Chapter 2 : Security components and mechanisms
keywords: Firewalls, stateless firewall, statefull firewall, proxy, ACL (standard and extended), VLAN
Download it from here : chap2 (1 slide/page) or chap2 (4 slides/page)
- 06 November 2014 : Chapter 3 : Classic Cryptography
keywords: Classical cryptographic attacks, COA, KPA, CPA, CCA, Brute force attack, Monoalphabetic cipher, Cesar, Playfair, Polyalphabetic cipher, viginere, autokey, Vernam cipher, One time pad, Transposition cipher, product cipher
Download it from here : chap3 (1 slide/page) or chap3 (4 slides/page)
- 20 November 2014 : Chapter 4 : Modern Cryptography
keywords: Confusion & Diffusion, stream ciphers, bloc ciphers, DES, 2DES, meet-in-the-middle attack, 3DES, ECB, CBC, CFB, OFB, CTR
Download it from here : chap4 (1 slide/page) or chap4 (4 slides/page)
- 04 December 2014 : Chapter 5 : Public Cryptography, Hach, MAC & Digital signature
keywords: Public key cryptography, RSA, fast exponentiation, Diffie-Hellman key exchange, man-in-the-middle attack, Hach functions, message authentication, anniversary paradox, SHA-512, MAC, authenticated encryption, digital signature
Download it from here : chap5 (1 slide/page) or chap5 (4 slides/page)