Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2023/2024
UPOZORNĚNÍ: Jsou dostupné studijní plány pro následující akademický rok.

Information Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
BE2M32IBE Z,ZK 5 2P + 2C English
Garant předmětu:
Petr Hampl, Tomáš Vaněk
Lecturer:
Robert Bešťák, Petr Hampl, Iyad Khuder
Tutor:
Robert Bešťák, Petr Hampl, Iyad Khuder, Ján Kučerák
Supervisor:
Department of Telecommunications Engineering
Synopsis:

The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.

Requirements:

1. Knowledge of modular arithmetics and algebra.

2. ISO/OSI network model, knowledge of computer networks principles

3. Programming in high-level languages (Java,C#, C/C++)

Syllabus of lectures:

1. Introduction to Cryptology, Basic Terms, Historical Overview

2. Block ciphers

3. Cryptographic Modes of Operation

4. Stream Ciphers

5. Random and Pseudoranmdom Number Generators

6. Public-key Algorithms

7. Hash functions

8. Authentication Protocols

9. Digital Signature, Certification Authority

10. Security in Wireless Networks

11. Security in Mobile network

12. Virtual Private Network security - IPsec, OpenVPN, SSL-VPN

13. SSL/TLS, DTLS

14. VoIP security

Syllabus of tutorials:

1. Introduction, passing conditions, health and safety regulations

2. Cryptanalysis of monoalplhabetic substitutions

3. Cryptanalysis of polyalphabetic substitutions

4. Cryptanalysis of transposition ciphers

5. Cryptanalysis of asymmetric key ciphers

6. Mid-term test

7. Introduction to laboratory exercises

8. Laboratory exercises

9. Laboratory exercises

10. Laboratory exercises

11. Laboratory exercises

12. Laboratory exercises

13. Final Test

14. Assesment

Study Objective:

Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.

Study materials:

1) Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4

2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1

3)Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/

Note:
Further information:
https://moodle.fel.cvut.cz
Time-table for winter semester 2023/2024:
Time-table is not available yet
Time-table for summer semester 2023/2024:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
roomT2:C3-337
Kučerák J.
12:45–14:15
(lecture parallel1
parallel nr.101)

Dejvice
T2:C3-337
Tue
Wed
Thu
roomT2:C3-337
Hampl P.
11:00–12:30
(lecture parallel1)
Dejvice
T2:C3-337
Fri
The course is a part of the following study plans:
Data valid to 2024-03-27
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet4677206.html