Information Security and Secretion of Messages
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
XE32IBU | Z | 3 | 2+1s |
- The course is a substitute for:
- Information Security and Secretion of Messages (X32IBU)
- Lecturer:
- Tutor:
- Supervisor:
- Department of Telecommunications Engineering
- Synopsis:
-
Information security and secretion of messages in an electronic society requires many technical and legal skills. The technical means is provided through cryptology. Cryptology is concerned with the designing and the breaking of systems for the communication of secret information. The rapid development of computers, the electronic transmission of information, and the electronic transfer of funds contributed to the evolution of cryptology from a military and diplomatic communications to a major concern of business. The subject IBU provides a comprehensive source for students who are interested in protection of information systems and information technologies.
- Requirements:
-
- Solution of the individual cryptanalysis project
- Passing the final test (>80%)
- Attendance at exercises (>75%)
- Syllabus of lectures:
-
1. History of cryptology
2. Symmetric-key Algorithms I (DES, 3-DES, RC4)
3. Symmetric-key Algorithms II (AES, Blowfish, RC6)
4. Public-key Algorithms (RSA, El-Gamal)
5. Elliptic Curve Cryptosystems - ECC
6. Hash functions (MD-5,SHA-1)
7. Cryptographic Modes of Operation (ECB, CBC, OFB, CFB, CTR, PCBC, OMAC, CCMP)
8. Digital Signature , Certification Authority
9. IPSec (AH,ESP,IKE, ISAKMP)
10. SSL/TLS, WTLS
11. Steganography and digital watermarking
12.Security in Wireless Networks - WiFi, WiMAX, Bluetooth
13. Security in GSM, UMTS
14. Standards, recommendations and laws for data protection.
- Syllabus of tutorials:
-
1. Agenda, BOZP
2. Monoalphabetic substitutions ciphers cryptanalysis
3. Affine substitution ciphers cryptanalysis
4. Polyalphabetic substitutions ciphers cryptanalysis
5. Simple transpositions ciphers cryptanalysis
6. Solving the individual projects.
7. Assessment test
- Study Objective:
-
Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.
- Study materials:
-
1. Schneier, B.: Applied cryptography: Second Edition. JWS, 1996
2. Menezes A., Oorschot P., Vanstone S.: Handbook of Applied Cryptography, CRC Press, 2001
- Note:
- Further information:
- No time-table has been prepared for this course
- The course is a part of the following study plans: