Data Protection in Informatics
Code | Completion | Credits | Range |
---|---|---|---|
D32ODI | KZ | 4 | 14+4s |
- Lecturer:
- Tutor:
- Supervisor:
- Department of Telecommunications Engineering
- Synopsis:
-
For many years, the cryptography was the exclusive domain of the military and secret services. Today, state-of-the-art computer cryptography is outside the secured walls of the military agencies. The layman can now employ security practices that can protect information against the most powerful of adversaries. This course gives to the students the tools they need to protect their own privacy.
- Requirements:
- Syllabus of lectures:
-
1. Introduction to cryptology
2. Basic cryptographic protocols and its building blocks
3. Cryptographic keys and its management
4. Cryptographic algorithm types and modes
5. Mathematical backgrounds of cryptology
6. Encryption algorithm DES (Data Encryption Standard)
7. Other block ciphers
8. Stream ciphers
9. One-way hash functions
10. Public-key algorithms and digital signature
11. Identification schemes
12. Special algorithms for protocols
13. Security of data in computer networks
14. Legal and ethic security of data
- Syllabus of tutorials:
-
1. Introduction
2. Basic ciphers - transposition and substitution ciphers
3. Individual projects
4. - 13. Solving the individual projects
14. Assessment test. Assessment
- Study Objective:
- Study materials:
-
[1] Schneier, B. Applied cryptography. John Wiley and Sons, 1996.
- Note:
- Further information:
- No time-table has been prepared for this course
- The course is a part of the following study plans: