Logo ČVUT
Loading...
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2011/2012

Information Security and Secretion of Messages

The course is not on the list Without time-table
Code Completion Credits Range Language
XE32IBU Z 3 2+1s
The course is a substitute for:
Information Security and Secretion of Messages (X32IBU)
Lecturer:
Tutor:
Supervisor:
Department of Telecommunications Engineering
Synopsis:

Information security and secretion of messages in an electronic society requires many technical and legal skills. The technical means is provided through cryptology. Cryptology is concerned with the designing and the breaking of systems for the communication of secret information. The rapid development of computers, the electronic transmission of information, and the electronic transfer of funds contributed to the evolution of cryptology from a military and diplomatic communications to a major concern of business. The subject IBU provides a comprehensive source for students who are interested in protection of information systems and information technologies.

Requirements:

- Solution of the individual cryptanalysis project

- Passing the final test (>80%)

- Attendance at exercises (>75%)

Syllabus of lectures:

1. History of cryptology

2. Symmetric-key Algorithms I (DES, 3-DES, RC4)

3. Symmetric-key Algorithms II (AES, Blowfish, RC6)

4. Public-key Algorithms (RSA, El-Gamal)

5. Elliptic Curve Cryptosystems - ECC

6. Hash functions (MD-5,SHA-1)

7. Cryptographic Modes of Operation (ECB, CBC, OFB, CFB, CTR, PCBC, OMAC, CCMP)

8. Digital Signature , Certification Authority

9. IPSec (AH,ESP,IKE, ISAKMP)

10. SSL/TLS, WTLS

11. Steganography and digital watermarking

12.Security in Wireless Networks - WiFi, WiMAX, Bluetooth

13. Security in GSM, UMTS

14. Standards, recommendations and laws for data protection.

Syllabus of tutorials:

1. Agenda, BOZP

2. Monoalphabetic substitutions ciphers cryptanalysis

3. Affine substitution ciphers cryptanalysis

4. Polyalphabetic substitutions ciphers cryptanalysis

5. Simple transpositions ciphers cryptanalysis

6. Solving the individual projects.

7. Assessment test

Study Objective:

Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.

Study materials:

1. Schneier, B.: Applied cryptography: Second Edition. JWS, 1996

2. Menezes A., Oorschot P., Vanstone S.: Handbook of Applied Cryptography, CRC Press, 2001

Note:
Further information:
No time-table has been prepared for this course
The course is a part of the following study plans:
Generated on 2012-7-9
For updated information see http://bilakniha.cvut.cz/en/predmet11863304.html