Logo ČVUT
Loading...
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2011/2012

Data Protection in Informatics

The course is not on the list Without time-table
Code Completion Credits Range
D32ODI KZ 4 14+4s
Lecturer:
Tutor:
Supervisor:
Department of Telecommunications Engineering
Synopsis:

For many years, the cryptography was the exclusive domain of the military and secret services. Today, state-of-the-art computer cryptography is outside the secured walls of the military agencies. The layman can now employ security practices that can protect information against the most powerful of adversaries. This course gives to the students the tools they need to protect their own privacy.

Requirements:
Syllabus of lectures:

1. Introduction to cryptology

2. Basic cryptographic protocols and its building blocks

3. Cryptographic keys and its management

4. Cryptographic algorithm types and modes

5. Mathematical backgrounds of cryptology

6. Encryption algorithm DES (Data Encryption Standard)

7. Other block ciphers

8. Stream ciphers

9. One-way hash functions

10. Public-key algorithms and digital signature

11. Identification schemes

12. Special algorithms for protocols

13. Security of data in computer networks

14. Legal and ethic security of data

Syllabus of tutorials:

1. Introduction

2. Basic ciphers - transposition and substitution ciphers

3. Individual projects

4. - 13. Solving the individual projects

14. Assessment test. Assessment

Study Objective:
Study materials:

[1] Schneier, B. Applied cryptography. John Wiley and Sons, 1996.

Note:
Further information:
No time-table has been prepared for this course
The course is a part of the following study plans:
Generated on 2012-7-9
For updated information see http://bilakniha.cvut.cz/en/predmet11851504.html