Ciphers and information security

The course is not on the list Without time-table
Code Completion Credits Range Language
A7B32KBE Z,ZK 6 2P + 2L Czech
The course cannot be taken simultaneously with:
Data Transmission and Data Processing Security (Y36BEZ)
Enrollement in the course requires an assessment of the following courses:
Mathematics for Computer Science (A7B01MCS)
Tomáš Vaněk (guarantor), Jaromír Hrad, Ivan Pravda
Tomáš Vaněk (guarantor), Petr Hampl, Jaromír Hrad, Petr Jareš, Ivan Pravda, Michal Vondra, Ondřej Vondrouš
Department of Telecommunications Engineering

The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned.


A7B01MCS - Mathematics for Computer Science

Evaluation of the course will be: 50% written exam, 50% individual project

Syllabus of lectures:

1. History of cryptology, Steganography and digital watermarking

2. Symmetric-key Algorithms I - DES, 3-DES, AES, RC4

3. Symmetric-key Algorithms II - MARS, Serpent, Blowfish, RC6

4. Public-key Algorithms - RSA, El-Gamal, ECC

5. Hash functions - MD5,SHA-x,, RIPEMD-160, Whirlpool, Tiger

6. Authentication protocols (Kerberos, RADIUS, TACACS)

7. Ipsec


9. Security in Wirelles Networks - 802.11, 802.15, 802.16

10. Security in GSM, UMTS

11. Digital signature, Certificate Authorities

12. Quantum cryptography

13. Patents, standards, laws and recommendations for data protection.

Syllabus of tutorials:

1. Initial excercise, BOZP, Google hacking

2. Individual project

3. Cryptanalysis of the monoalphabetic substitution ciphers

4. Individual project

5. Cryptanalysis of the polyalphabetic substitution ciphers

6. Individual project

7. Cryptanalysis of the transposition ciphers

8. Individual project

9. Lab.1 - Authentication in LAN using IEEE 802.1x framework

10. Lab.2 - VPN using IPsec

11. Lab.3 - VPN using SSL/TLS

12. Test

13. Assesment

Study Objective:

Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.

Study materials:

[1]Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, volně ke stažení na http://www.cacr.math.uwaterloo.ca/hac/

[2]Levický D., Kryptografia v informačnej bezpečnosti, elfa, 2005,ISBN:80-8086-022-X

[3]Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1

[4]Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4

Further information:
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2020-05-24
For updated information see http://bilakniha.cvut.cz/en/predmet1392706.html