Advanced Privacy Technologies (B-KUL-H0Q29A)
Aims
This course will focus on the modeling, design and analysis of private communication networks. In particular, the course will cover:
- Design elements: system architectures, network topologies, routing algorithms, mixing and cover traffic strategies.
- Communication privacy properties: unlinkability, anonymity, unobservability, undetectability.
- Types of systems: decryption mix networks, re-encryption mix networks, onion routing networks, peer-to-peer networks.
- Security analysis: review of vulnerabilities and known attacks on existing designs, explanation of attack principles and privacy evaluation methods
- Tradeoffs between privacy, latency, overhead, scalability, decentralization
- Open challenges for large-scale deployment
Previous knowledge
Students should have taken the course Privacy Technologies (B-KUL-H09L2A)
Order of Enrolment
Mixed prerequisite:
You may only take this course if you comply with the prerequisites. Prerequisites can be strict or flexible, or can imply simultaneity. A degree level can be also be a prerequisite.
Explanation:
STRICT: You may only take this course if you have passed or applied tolerance for the courses for which this condition is set.
FLEXIBLE: You may only take this course if you have previously taken the courses for which this condition is set.
SIMULTANEOUS: You may only take this course if you also take the courses for which this condition is set (or have taken them previously).
DEGREE: You may only take this course if you have obtained this degree level.
FLEXIBLE( H09L2A )
The codes of the course units mentioned above correspond to the following course descriptions:
H09L2A : Privacy Technologies
Is included in these courses of study
- Master of Cybersecurity (Leuven) 60 ects.
Activities
2.4 ects. Advanced Privacy Technologies: Lecture (B-KUL-H0Q29a)
Content
This course will focus on the modeling, design and analysis of private communication networks. In particular, the course will cover:
- Design elements: system architectures, network topologies, routing algorithms, mixing and cover traffic strategies.
- Communication privacy properties: unlinkability, anonymity, unobservability, undetectability.
- Types of systems: decryption mix networks, re-encryption mix networks, onion routing networks, peer-to-peer networks.
- Security analysis: review of vulnerabilities and known attacks on existing designs, explanation of attack principles and privacy evaluation methods
- Trade-offs between privacy, latency, overhead, scalability, decentralization
- Open challenges for large-scale deployment
Course material
Course material will be provided on Toledo
0.6 ects. Advanced Privacy Technologies: Exercises Laboratory Sessions (B-KUL-H0Q30a)
Content
The course will be completed by 4 exercise sessions
Course material
Course material will be provided on Toledo
Evaluation
Evaluation: Advanced Privacy Technologies (B-KUL-H2Q29a)
Explanation
Written assignment and presentation
Information about retaking exams
Written assignment (no presentation), evaluated on 20 points.