Ciphers and Information Security
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
AD7B32KBE | Z,ZK | 6 | 14+6c | Czech |
- Lecturer:
- Tomáš Vaněk (gar.)
- Tutor:
- Tomáš Vaněk (gar.), Ivan Pravda
- Supervisor:
- Department of Telecommunications Engineering
- Synopsis:
-
The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned. The course also contains a primer of quantum cryptography and cryptonalysis.
- Requirements:
-
Final exam grading is in part derived from the quality of presented homework and activity at seminars.
- Syllabus of lectures:
-
1. Modular arithmetic essentials, Number theory essentials, Fundamental theorem of arithmetic
2. Mathematical fundaments of cryptograhy, Substitution ciphers
3. Block, transposition and exponential ciphers, key exchange.
4. Information theory, Complexity theory
5. Hashing functions, MD5, SHA-x, HMAC
6. Chinese Remainder Theorem, Prime number tests, Stream ciphers, RC4
7. Stream ciphers, block ciphers, DES, 3DES, AES, cipher operating modes
8. Asymmetric cryptography 1
9. Asymmetric cryptography 2
10. Shared secret
11. Quantum cryptography introduction
12. Introduction to cryptanalysis
13. Elliptic curve cryptography
14. Reserved
- Syllabus of tutorials:
-
1. Modular arithmetic essentials 1
2. Modular arithmetic essentials 2, substitution ciphers, affine ciphers
3. Block, transposition, Vigenere, and exponential ciphers.
4. Information theory, complexity theory. NTL C++ library.
5. Hashing functions in C/C++
6. Prime number tests, RC4 stream cipher
7. Operations in GF(2^8), homework assignments
8. Individual work
9. Individual work
10. Individual work
11. Asymmetric cryptograhy
12. SSL encryption, homework consultations and evaluation
13. Homework consultations and evaluation, credit
14. Reserved
- Study Objective:
-
Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.
- Study materials:
-
Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, free download at http://www.cacr.math.uwaterloo.ca/hac/
Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
- Note:
- Time-table for winter semester 2011/2012:
- Time-table is not available yet
- Time-table for summer semester 2011/2012:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon Tue Fri Thu Fri - The course is a part of the following study plans:
-
- Inteligentní systémy (STM-A7B-přechodné) (compulsory course in the program)
- Manažerská informatika (STM-A7B-přechodné) (compulsory course in the program)
- Web a multimedia (STM-A7B-přechodné) (compulsory course in the program)
- Softwarové inženýrství (STM-A7B-přechodné) (compulsory course in the program)
- Inteligentní systémy (STM-A7B) (compulsory course in the program)
- Manažerská informatika (STM-A7B) (compulsory course in the program)
- Softwarové inženýrství (STM-A7B) (compulsory course in the program)
- Web a multimedia (STM-A7B) (compulsory course in the program)