CODE 114751 ACADEMIC YEAR 2025/2026 CREDITS 5 cfu anno 2 ELECTRONIC ENGINEERING 11780 (LM-29) - GENOVA SCIENTIFIC DISCIPLINARY SECTOR ING-INF/01 LANGUAGE English TEACHING LOCATION GENOVA SEMESTER 1° Semester AIMS AND CONTENT LEARNING OUTCOMES The Course gives notions in Cryptology (Algorithms, Protocols, Systems) with a focus on electronics. It aims to provide the student with an awareness in embedded electronics for security (encryption machines, biometry devices) and cyber security for the protection of infrastructures. Teaching objectives include electronics tools for computer forensics and advanced methods for intelligence. AIMS AND LEARNING OUTCOMES The course's main objective is to provide a basic knowledge of the main aspects and techniques required to implement secure network and telecommunications services. The class is structured in two main parts. The first part, after a concise reminder of the basic concepts, architectures, and main encryption techniques, completes the knowledge of the fundamental technologies with the presentation and discussion of secure hash functions, causal number generation mechanisms for security applications, data integrity assurance technologies, digital signature mechanisms, key distribution techniques and finally authentication approaches and solutions. The second part introduces and describes the most relevant security protocols in use at the different network layers, in particular in the case of the line layer, the protocols and mechanisms adopted on both wired and wireless LANs, the IPSec protocol for the network layer, the SSL-TSL protocols for the transport layer, and at the application layer secure e-mail and DNS protection mechanisms. As a final topic, firewalls' operation and use are addressed. At the end of the course, the student is familiar with the leading cyber security techniques used in telecommunications networks, can identify the most suitable solutions for securing different network contexts, and can critically analyze approaches that have already been adopted or proposed. TEACHING METHODS Traditional direct lessons with application experience in network, transport, application layers, and firewalls. Please note that both support material and lectures are in English. Students with valid certifications for Specific Learning Disorders (SLDs), disabilities or other educational needs are invited to contact the teacher and the School's contact person for disability at the beginning of teaching to agree on possible teaching arrangements that, while respecting the teaching objectives, take into account individual learning patterns. Contacts of the teacher and the School's disability contact person can be found at the following link Comitato di Ateneo per l’inclusione delle studentesse e degli studenti con disabilità o con DSA | UniGe | Università di Genova SYLLABUS/CONTENT Introduction to cryptography Simmetric cyphers Asimmetric cryptography Secure hash functions Message Authentication Code (MAC) Digital signature Key distribution techniques Authentication methods Telecommunication network protocols for security Link Layer: NAC and WiFi Security Network Layer: IP-Sec Transport Layer: SSL/TSL Application Layer: Secure Email and DNS Firewalls RECOMMENDED READING/BIBLIOGRAPHY Course material on Aulaweb: copy of all lecture slides W. Stallings, Cryptography and Network Security – Principles and Practice (8th Global Edition), Pearson, 2022 TEACHERS AND EXAM BOARD RODOLFO ZUNINO Ricevimento: By appointment after direct contact with the Teacher rodolfo.zunino@unige.it RAFFAELE BOLLA Ricevimento: Appointment upon students' requests (direct or by email). LESSONS Class schedule The timetable for this course is available here: Portale EasyAcademy EXAMS EXAM DESCRIPTION The examination consists of an initial multiple-choice written test followed by an oral assessment. The examined students only access the oral assessment if they obtain a score above a minimum threshold of sufficiency on the test. ASSESSMENT METHODS The test aims to verify the presence of a minimum level of knowledge. The oral exam has the task of ascertaining the level of critical capacity and reasoning acquired by the student on the course topics through pointed questions on the various technologies, requests to outline possible solutions to application problems, and the critical analysis of predefined scenarios and situations. The examination consists of an initial multiple-choice written test followed by an oral assessment. The examined students only access the oral assessment if they obtain a score above a minimum threshold of sufficiency on the test.