Logo ČVUT
Loading...
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2011/2012

Data Transmission and Data Processing Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range
Y36BEZ Z,ZK 5 2+2l
The course cannot be taken simultaneously with:
Ciphers and information security (A7B32KBE)
The course is a substitute for:
Ciphers and information security (A7B32KBE)
Lecturer:
Tomáš Vaněk (gar.)
Tutor:
Tomáš Vaněk (gar.), Jakub Doležal, Petr Hampl, Jaromír Hrad, Petr Chlumský, Petr Jareš, Jan Kubr, Vladimír Machula, Ivan Pravda, Matěj Rohlík
Supervisor:
Department of Telecommunications Engineering
Synopsis:

The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned. The course also contains a primer of quantum cryptography and cryptonalysis.

Requirements:

Final exam grading is in part derived from the quality of presented homework and activity at seminars.

Syllabus of lectures:

1. History of cryptology

2. Steganography and digital watermarking

3. Symmetric-key Algorithms I - DES, 3-DES, AES, RC4

4. Symmetric-key Algorithms II - MARS, Serpent, Blowfish, RC6

5. Public-key Algorithms - RSA, El-Gamal, ECC

6. Hash functions -MD-5,SHA-1, SHA-2, RIPEMD-160, Whirlpool, Tiger

7. Authentication protocols (Kerberos, RADIUS, TACACS)

8. Ipsec - AH,ESP,IKE,ISAKMP, Oakley

9. SSL/TLS,WTLS

10. Security in Wirelles Networks - 802.11, 802.15, 802.16

11. Security in GSM, UMTS

12. Digital signature, Certificate Authorities

13. Quantum cryptography

14. Patents, standards, laws and recommendations for data protection.

Syllabus of tutorials:

1. Intro, BOZP, Google hacking

2. Individual project

3. Cryptanalysis of the monoalphabetic substitution ciphers

4. Individual project

5. Cryptanalysis of the polyalphabetic substitution ciphers

6. Individual project

7. Cryptanalysis of the transposition ciphers

8. Individual project

9. Lab.1 - Authentication in LAN using IEEE 802.1x framework

10. Lab.2 - VPN using IPsec

11. Lab.3 - VPN using SSL/TLS

12. Test

13. Assesment

Study Objective:

Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.

Study materials:

[1]Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, volně ke stažení na http://www.cacr.math.uwaterloo.ca/hac/

[2]Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1

[3]Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4

Note:
Time-table for winter semester 2011/2012:
Time-table is not available yet
Time-table for summer semester 2011/2012:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
roomT2:B3-714
Pravda I.
Chlumský P.

07:30–09:00
(lecture parallel1
parallel nr.101)

Dejvice
Laboratoř K332
Fri
roomT2:B3-714
Jareš P.
Kubr J.

09:15–10:45
(lecture parallel1
parallel nr.108)

Dejvice
Laboratoř K332
Thu
roomKN:E-107
Vaněk T.
09:15–10:45
(lecture parallel1)
Karlovo nám.
Zengerova posluchárna K1
Fri
The course is a part of the following study plans:
Generated on 2012-7-9
For updated information see http://bilakniha.cvut.cz/en/predmet11889304.html