First cycle
degree courses
Second cycle
degree courses
Single cycle
degree courses
School of Engineering
Course unit
INP9087837, A.A. 2019/20

Information concerning the students who enrolled in A.Y. 2019/20

Information on the course unit
Degree course Second cycle degree in
IN2371, Degree course structure A.Y. 2019/20, A.Y. 2019/20
bring this page
with you
Degree course track INTERNATIONAL MOBILITY [005PD]
Number of ECTS credits allocated 6.0
Type of assessment Mark
Course unit English denomination INFORMATION SECURITY
Department of reference Department of Information Engineering
Mandatory attendance No
Language of instruction English
Single Course unit The Course unit can be attended under the option Single Course unit attendance
Optional Course unit The Course unit can be chosen as Optional Course unit

Teacher in charge NICOLA LAURENTI ING-INF/03

Course unit code Course unit name Teacher in charge Degree course code

ECTS: details
Type Scientific-Disciplinary Sector Credits allocated
Core courses ING-INF/03 Telecommunications 6.0

Course unit organization
Period First semester
Year 1st Year
Teaching method frontal

Type of hours Credits Teaching
Hours of
Individual study
Laboratory 1.0 8 17.0 No turn
Lecture 5.0 40 85.0 No turn

Start of activities 30/09/2019
End of activities 18/01/2020
Show course schedule 2019/20 Reg.2019 course timetable

Prerequisites: The class requires previous basic knowledge in:
1. communication or computer networks.
2. digital communications
3. algorithms and computational complexity
4. statistics, probability and information theory
Target skills and knowledge: The class aims at introducing the students to the fundamental notions and tools in information security, with a focus on the solutions, attacks and countermeasures that can be deployed at the different layers in modern communication networks.

It is expected that the students shall learn:
1. To take awareness of how critical it is to protect information assets in an adversarial context.
2. Security goals and services, as well as distinguish how they can be provided by different protection mechanisms.
3. Computational and unconditional security mechanisms for several services at the different layers of a communication network.

Moreover it is expected that the students shall be able to:
1. Recognize threats and vulnerabilities in a communication system/network instance.
2. Identify the required security goals and services in a specific context, as well as how they can be provided by different protection mechanisms.
3. Evaluate the level of security of mechanisms and protocols, even quantitatively.
4. Properly choose the parameters of a security mechanism (e.g., key size, number of protocol rounds) according to the required security level.
Examination methods: The exam is split into two parts:
1. An individual essay on a specific topic (e.g., a literature review).
2. A traditional type oral exam on the course topics
The student must first submit his essay, for evaluation by the instructor. If approved, the student is admitted to the oral exam after which he will obtain his final grade.
Assessment criteria: The exam aims at assessing to what extent the students has acquired
1. a solid understanding of fundamental security notions
2. the ability to apply general models to particular instances of algorithms and protocols
3. critical thinking in the evaluation and comparison of different
Course unit contents: 1. Basic security notions and definitions.
2. Quantitative definitions and assessment of security level.
3. Cryptographic and non cryptographic security mechanisms.
4. Network security protocols at different layers.
5. Further security issues for wireless, ad hoc and mobile networks.
Planned learning activities and teaching methods: Lectures and laboratory sessions.
Small group discussions and interactive lectures.
Additional notes about suggested reading: Additional material and references to the scientific and technical
literature will be available on the class Moodle page.
Textbooks (and optional supplementary readings)
  • Douglas R. Stinson, Cryptography: Theory and Practice.. --: Chapman&Hall/CRC, 2014. 4h ed. ISBN 9781138197015, alternatively 3rd ed. from 2006 ISBN 9781584885085 is also ok Cerca nel catalogo

Innovative teaching methods: Teaching and learning strategies
  • Lecturing
  • Laboratory
  • Problem based learning
  • Case study
  • Interactive lecturing
  • Working in group
  • Questioning
  • Auto correcting quizzes or tests for periodic feedback or exams
  • Active quizzes for Concept Verification Tests and class discussions
  • Loading of files and pages (web pages, Moodle, ...)

Innovative teaching methods: Software or applications used
  • Moodle (files, quizzes, workshops, ...)
  • One Note (digital ink)
  • Kaltura (desktop video shooting, file loading on MyMedia Unipd)
  • Top Hat (active quiz, quiz)
  • Latex
  • Mathematica
  • Matlab

Sustainable Development Goals (SDGs)
Quality Education Industry, Innovation and Infrastructure