Logo ČVUT
Loading...
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2011/2012

Information Security and Secretion of Messages

The course is not on the list Without time-table
Code Completion Credits Range Language
X32IBU Z 3 2+1c Czech
Lecturer:
Tomáš Vaněk (gar.)
Tutor:
Tomáš Vaněk (gar.)
Supervisor:
Department of Telecommunications Engineering
Synopsis:

Information security and secretion of messages in an electronic society requires many technical and legal skills. The technical means is provided through cryptology. Cryptology is concerned with the designing and the breaking of systems for the communication of secret information. The rapid development of computers, the electronic transmission of information, and the electronic transfer of funds contributed to the evolution of cryptology from a military and diplomatic communications to a major concern of business. The subject IBU provides a comprehensive source for students who are interested in protection of information systems and information technologies.

Requirements:

- solution of the individual cryptanalysis project

- passing the final test

- attendance at exercises

Syllabus of lectures:

1. History of cryptology

2. Steganography and digital watermarking

3. Symmetric-key Algorithms I - DES, 3-DES, AES, RC4

4. Symmetric-key Algorithms II - MARS, Serpent, Blowfish, RC6

5. Public-key Algorithms - RSA, El-Gamal, DH, ECC

5. Hash functions -MD-5,SHA-1, SHA-2, RIPEMD-160m, Whirlpool, Tiger

6. Hash functions -MD-5,SHA-1, SHA-2, RIPEMD-160m, Whirlpool, Tiger

7. Authentication protocols (Kerberos, RADIUS, TACACS)

8. Ipsec - AH,ESP,IKE,ISAKMP, Oakley

9. SSL/TLS, WTLS

10. Security in Wirelles Networks - 802.11, 802.15, 802.16

11. Security in GSM, UMTS

12. Digital signature, Certificate Authorities

13. Quantum cryptography

14. Patents, standards, laws and recommendations for data protection.

Syllabus of tutorials:

1. Agenda, BOZP

2. Mathematical background

3. Substitution and transposition ciphers cryptanalysis

4. Lab.I - Attacks and protection against them on the link layer - ARP cache poisoning, DHCP spoofing

5. Lab.II - VPN using Cisco routers 26xx and 175x

6. Lab. III - Wireless network detection and location

7. Assessment test

Study Objective:

Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.

Study materials:

[1]Přibyl J., Kodl J.: Ochrana dat v informatice, ČVUT, 1997, ISBN: 80-01-01664-1

[2]Přibyl J., Informační bezpečnost a utajování zpráv, ČVUT, 2004, ISBN: 80-01-02863-1

[3]Dostálek L. a kol., Velký průvodce protokoly TCP/IP - Bezpečnost, Computer Press, 2003, ISBN: 80-7226-849-X

[4]Singh S., Velká kniha kódů a šifer, Argo, 2001, ISBN 80-86569-18-7

[5]Barken L., Jak zabezpečit bezdrátovou síť, Computer Press, 2004, ISBN: 80-251-0346-3

[6]Levický D., Kryptografia v informačnej bezpečnosti, elfa, 2005,ISBN:80-8086-022-X

[7]Mao W., Modern Cryptography - Tudory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1

[8]Stamp M., Information Security - Principles and Praktice, Wiley, 2006, ISBN: 0-471-73848-4

Note:
Further information:
No time-table has been prepared for this course
The course is a part of the following study plans:
Generated on 2012-7-9
For updated information see http://bilakniha.cvut.cz/en/predmet11601304.html