Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2019/2020

Information Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
B2M32IBEA Z,ZK 6 2P + 2C Czech
Lecturer:
Tomáš Vaněk (guarantor)
Tutor:
Petr Hampl, Tomáš Vaněk (guarantor), Jaromír Hrad, Ivan Pravda
Supervisor:
Department of Telecommunications Engineering
Synopsis:

The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.

Requirements:

1. Knowledge of modular arithmetics and algebra.

2. ISO/OSI network model, knowledge of computer networks principles

3. Programming in high-level languages (Java,C#, C/C++)

Syllabus of lectures:

1. Introduction to cryptology, historical overview

   2. Block ciphers

   3. Block ciphers modes of operation

   4. Stream ciphera

   5. Public key cryptosystems

   6. Hash functions

   7. Authentication protocols

   8. Virtual Private Networks - IPsec

   9. Cryptographic protocols - SSL / TLS, DTLS, SSH

  10. X.509 certificate, certificate authority public key infrastructure

  11. Securing e-mail communication - S / MIME, PGP

  12. Electronic signature, electronic identity

  13. APT (Advanced Persistent Threats)

  14. Laws and standards in the field of information security

Syllabus of tutorials:

1. Introduction, passing conditions, health and safety regulations

2. Cryptanalysis of monoalplhabetic substitutions

3. Cryptanalysis of polyalphabetic substitutions

4. Cryptanalysis of transposition ciphers

5. Cryptanalysis of asymmetric key ciphers

6. Mid-term test

7. Introduction to laboratory exercises

8. Laboratory exercises

9. Laboratory exercises

10. Laboratory exercises

11. Laboratory exercises

12. Laboratory exercises

13. Final Test

14. Assesment

Study Objective:
Study materials:

1) Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4

2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1

3)Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/

Note:
Time-table for winter semester 2019/2020:
Time-table is not available yet
Time-table for summer semester 2019/2020:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
roomT2:B3-714
Pravda I.
Hrad J.

07:30–09:00
(lecture parallel1
parallel nr.101)

Dejvice
Laboratoř K132
roomT2:B3-714
Pravda I.
Hrad J.

09:15–10:45
(lecture parallel1
parallel nr.102)

Dejvice
Laboratoř K132
Fri
Thu
roomT2:E1-7
Vaněk T.
16:15–17:45
(lecture parallel1)
Dejvice haly
Laboratoř 13135
Fri
The course is a part of the following study plans:
Data valid to 2020-01-20
For updated information see http://bilakniha.cvut.cz/en/predmet5595206.html