Data Transmission and Data Processing Security
Code | Completion | Credits | Range |
---|---|---|---|
Y36BEZ | Z,ZK | 5 | 2+2l |
- The course cannot be taken simultaneously with:
- Ciphers and information security (A7B32KBE)
- The course is a substitute for:
- Ciphers and information security (A7B32KBE)
- Lecturer:
- Tomáš Vaněk (gar.)
- Tutor:
- Tomáš Vaněk (gar.), Jakub Doležal, Petr Hampl, Jaromír Hrad, Petr Chlumský, Petr Jareš, Jan Kubr, Vladimír Machula, Ivan Pravda, Matěj Rohlík
- Supervisor:
- Department of Telecommunications Engineering
- Synopsis:
-
The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned. The course also contains a primer of quantum cryptography and cryptonalysis.
- Requirements:
-
Final exam grading is in part derived from the quality of presented homework and activity at seminars.
- Syllabus of lectures:
-
1. History of cryptology
2. Steganography and digital watermarking
3. Symmetric-key Algorithms I - DES, 3-DES, AES, RC4
4. Symmetric-key Algorithms II - MARS, Serpent, Blowfish, RC6
5. Public-key Algorithms - RSA, El-Gamal, ECC
6. Hash functions -MD-5,SHA-1, SHA-2, RIPEMD-160, Whirlpool, Tiger
7. Authentication protocols (Kerberos, RADIUS, TACACS)
8. Ipsec - AH,ESP,IKE,ISAKMP, Oakley
9. SSL/TLS,WTLS
10. Security in Wirelles Networks - 802.11, 802.15, 802.16
11. Security in GSM, UMTS
12. Digital signature, Certificate Authorities
13. Quantum cryptography
14. Patents, standards, laws and recommendations for data protection.
- Syllabus of tutorials:
-
1. Intro, BOZP, Google hacking
2. Individual project
3. Cryptanalysis of the monoalphabetic substitution ciphers
4. Individual project
5. Cryptanalysis of the polyalphabetic substitution ciphers
6. Individual project
7. Cryptanalysis of the transposition ciphers
8. Individual project
9. Lab.1 - Authentication in LAN using IEEE 802.1x framework
10. Lab.2 - VPN using IPsec
11. Lab.3 - VPN using SSL/TLS
12. Test
13. Assesment
- Study Objective:
-
Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.
- Study materials:
-
[1]Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, volně ke stažení na http://www.cacr.math.uwaterloo.ca/hac/
[2]Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
[3]Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
- Note:
- Time-table for winter semester 2011/2012:
- Time-table is not available yet
- Time-table for summer semester 2011/2012:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon Tue Fri Thu Fri - The course is a part of the following study plans:
-
- Softwarové inženýrství (compulsory course)
- Web a multimedia (compulsory course)
- Manažerská informatika (compulsory course)
- Inteligentní systémy (compulsory course)