Communications and Cibersecurity
1
2025-2026
02055784
Communications, Cloud and IoT
English
Portuguese
Face-to-face
SEMESTRIAL
6.0
Compulsory
2nd Cycle Studies - Mestrado
Recommended Prerequisites
BSc in Informatics Engineering or equivalent.
Teaching Methods
Lecture classes (T): presentation and discussion of the course topics.
Lab classes (PL): application of the theoretical concepts in exercises and projects.
Learning Outcomes
This course aims to provide theoretical and practical knowledge on principles, algorithms, techniques, and approaches for system and communications security. It covers topics such as network security, symmetric and asymmetric cryptography algorithms, or network applications with cryptographic mechanisms, including wireless network security, cloud security, security in network and transport layers, firewalls, and malicious software. Emerging topics such as homomorphic and post-quantum cryptography are also discussed.
Students are expected to acquire/develop the following key skills:
- In cybersecurity assessment and management, risk analysis and management in systems and networks, and security risk management within information systems and their organizations.
- Practical application of theoretical knowledge, analysis and synthesis, and self-learning.
- Problem-solving, communication, interpersonal skills, and teamwork.
Work Placement(s)
NoSyllabus
1-Introduction
Communications security
Types of attacks
Cryptography principles
2-Symmetric Cryptography overview
Stream and block cipher modes
Substitution-permutation and Feistel networks
Data Encryption Standard
Advanced Encryption Standard
Other algorithms
3-Cryptographic Hash Functions and Message Authentication Codes
Secure Hash Algorithm
Message Authentication Codes (MAC) based on hash functions
MAC based on block ciphers
Authenticated encryption
4-Asymmetric Cryptography
RSA algorithm
Elliptic curve cryptography
Public Key Infrastructure
5-Applications
System and network-level applications
Blockchain (Concept, Applications, Smart contracts)
6-Key management, policies and procedures
Kerberos
Key and certificate practice statements
7-Communications security
Wireless network security
Cloud security
Network and Transport layer security
Firewalls
8-Malicious software
9-Emerging topics
Homomorphic encryption
Post-quantum cryptography.
Head Lecturer(s)
Bruno Miguel de Oliveira Sousa
Assessment Methods
Assessment
Project: 50.0%
Exam: 50.0%
Bibliography
- William Stallings, “Cryptography and Network Security – Principles and Practice”, 8th edition, Pearson Education Inc., 2022
- Wenliang Du, “Internet Security: A Hands- on Approach (Computer & Internet Security)” 3rd ed., ISBN: 978-1733003964, 2022.
- James F. Kurose, Keith W. Ross, “Computer Networking – A Top-Down Approach”, 8th edition, ISBN: 978-1292405469, Pearson, 2021.
- Jonathan Katz, Yehuda Lindell, “Introduction to Modern Cryptography”, CRC Press, 3rd Edition, 2020.
- F. Boavida, M. Bernardes, “Introdução à Criptografia”, FCA, 2019.