Sécurité des Réseaux

corrigé Examen janvier 2018

Année Universitaire 2017-2018

The course of "Security of information systems". The course is principally based on the Book Cryptography And Network Security 4th Edition 2005 by William Stallings.

Voir Syllabus

Projects :

- Attaques réseaux avec arp-scan, arpspoof, ettercap, sslstrip, mitm attack (pdf)

- L'outil de scan puissant "nmap" (pdf)

- OpenPGP, GnuPG, thunderbird et enigmail, Mailvelope, plugins firefox et chrome sur la communication par messages chiffrés (pdf)

- Système de video surveillance en utilisant, ffmpeg, ffserver et OpenCV (pdf)

AU 2015-2016

Syllabus du cours/TD

Principally based on textbook Cryptography And Network Security 4th Edition 2005 by William Stallings.

This course is for the classes LFIG3, ECOM3 and TSI3

- Chapitre 1

- Chapitre 2

- Chapitre 3

- Chapitre 4

TDs

- TD classical and stream cipher Corrected

- TD Symmetric ciphers Corrected

Labs:

- Attaques réseaux avec arp-scan, arpspoof, ettercap, sslstrip, mitm attack (pdf)

- L'outil de scan puissant "nmap" (pdf)

- OpenPGP, GnuPG, thunderbird et enigmail, Mailvelope, plugins firefox et chrome sur la communication par messages chiffrés (pdf)

- Système de video surveillance en utilisant, ffmpeg, ffserver et OpenCV (pdf)

Pour Les 3ECOM, ci-joint le corrigé du DS Réseaux mobiles

AU 2014-2015

Syllabus du cours/TD

Principally based on textbook Cryptography And Network Security 4th Edition 2005 by William Stallings.

This course is for the classes LFIG3, ECOM3 and TSI3

- 02 October 2014 : Chapter 1: Introduction to security

keywords: attacks, security services, threats, DoS, spywares, virus, TCP flooding, ARP spoofing and flooding, DHCP starvation,..

Download it from here : chap1 (1 slide/page) or chap1 (4 slides/page)

- 09 October 2014 : Chapter 2 : Security components and mechanisms

keywords: Firewalls, stateless firewall, statefull firewall, proxy, ACL (standard and extended), VLAN

Download it from here : chap2 (1 slide/page) or chap2 (4 slides/page)

- 06 November 2014 : Chapter 3 : Classic Cryptography

keywords: Classical cryptographic attacks, COA, KPA, CPA, CCA, Brute force attack, Monoalphabetic cipher, Cesar, Playfair, Polyalphabetic cipher, viginere, autokey, Vernam cipher, One time pad, Transposition cipher, product cipher

Download it from here : chap3 (1 slide/page) or chap3 (4 slides/page)

- 20 November 2014 : Chapter 4 : Modern Cryptography

keywords: Confusion & Diffusion, stream ciphers, bloc ciphers, DES, 2DES, meet-in-the-middle attack, 3DES, ECB, CBC, CFB, OFB, CTR

Download it from here : chap4 (1 slide/page) or chap4 (4 slides/page)

- 04 December 2014 : Chapter 5 : Public Cryptography, Hach, MAC & Digital signature

keywords: Public key cryptography, RSA, fast exponentiation, Diffie-Hellman key exchange, man-in-the-middle attack, Hach functions, message authentication, anniversary paradox, SHA-512, MAC, authenticated encryption, digital signature

Download it from here : chap5 (1 slide/page) or chap5 (4 slides/page)

Examen Son corrigé

Notes du DS