Logo ČVUT
Loading...
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2011/2012

Ciphers and Information Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
AD7B32KBE Z,ZK 6 14+6c Czech
Lecturer:
Tomáš Vaněk (gar.)
Tutor:
Tomáš Vaněk (gar.), Ivan Pravda
Supervisor:
Department of Telecommunications Engineering
Synopsis:

The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned. The course also contains a primer of quantum cryptography and cryptonalysis.

Requirements:

Final exam grading is in part derived from the quality of presented homework and activity at seminars.

Syllabus of lectures:

1. Modular arithmetic essentials, Number theory essentials, Fundamental theorem of arithmetic

2. Mathematical fundaments of cryptograhy, Substitution ciphers

3. Block, transposition and exponential ciphers, key exchange.

4. Information theory, Complexity theory

5. Hashing functions, MD5, SHA-x, HMAC

6. Chinese Remainder Theorem, Prime number tests, Stream ciphers, RC4

7. Stream ciphers, block ciphers, DES, 3DES, AES, cipher operating modes

8. Asymmetric cryptography 1

9. Asymmetric cryptography 2

10. Shared secret

11. Quantum cryptography introduction

12. Introduction to cryptanalysis

13. Elliptic curve cryptography

14. Reserved

Syllabus of tutorials:

1. Modular arithmetic essentials 1

2. Modular arithmetic essentials 2, substitution ciphers, affine ciphers

3. Block, transposition, Vigenere, and exponential ciphers.

4. Information theory, complexity theory. NTL C++ library.

5. Hashing functions in C/C++

6. Prime number tests, RC4 stream cipher

7. Operations in GF(2^8), homework assignments

8. Individual work

9. Individual work

10. Individual work

11. Asymmetric cryptograhy

12. SSL encryption, homework consultations and evaluation

13. Homework consultations and evaluation, credit

14. Reserved

Study Objective:

Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.

Study materials:

Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, free download at http://www.cacr.math.uwaterloo.ca/hac/

Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1

Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4

Note:
Time-table for winter semester 2011/2012:
Time-table is not available yet
Time-table for summer semester 2011/2012:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
Fri
Thu
Fri
roomKN:E-301
Vaněk T.
09:15–10:45
EVEN WEEK

(lecture parallel1)
Karlovo nám.
Šrámkova posluchárna K9
The course is a part of the following study plans:
Generated on 2012-7-9
For updated information see http://bilakniha.cvut.cz/en/predmet1392806.html