Logo ČVUT
Loading...
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2011/2012

Data Transmission and Data Processing Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range
YD36BEZ Z,ZK 5 14+6c
The course cannot be taken simultaneously with:
Ciphers and information security (A7B32KBE)
Lecturer:
Tomáš Vaněk (gar.)
Tutor:
Tomáš Vaněk (gar.)
Supervisor:
Department of Telecommunications Engineering
Synopsis:

The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned. The course also contains a primer of quantum cryptography and cryptonalysis.

Requirements:

Final exam grading is in part derived from the quality of presented homework and activity at seminars.

Syllabus of lectures:

1. History of cryptology

2. Steganography and digital watermarking

3. Symmetric-key Algorithms I - DES, 3-DES, AES, RC4

4. Symmetric-key Algorithms II - MARS, Serpent, Blowfish, RC6

5. Public-key Algorithms - RSA, El-Gamal, ECC

6. Hash functions -MD-5,SHA-1, SHA-2, RIPEMD-160, Whirlpool, Tiger

7. Authentication protocols (Kerberos, RADIUS, TACACS)

8. Ipsec - AH,ESP,IKE,ISAKMP, Oakley

9. SSL/TLS,WTLS

10. Security in Wirelles Networks - 802.11, 802.15, 802.16

11. Security in GSM, UMTS

12. Digital signature, Certificate Authorities

13. Quantum cryptography

14. Patents, standards, laws and recommendations for data protection.

Syllabus of tutorials:

1. Intro, BOZP, Google hacking

2. Individual project

3. Cryptanalysis of the monoalphabetic substitution ciphers

4. Individual project

5. Cryptanalysis of the polyalphabetic substitution ciphers

6. Individual project

7. Cryptanalysis of the transposition ciphers

8. Individual project

9. Lab.1 - Authentication in LAN using IEEE 802.1x framework

10. Lab.2 - VPN using IPsec

11. Lab.3 - VPN using SSL/TLS

12. Test

13. Assesment

Study Objective:
Study materials:

[1]Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, volně ke stažení na http://www.cacr.math.uwaterloo.ca/hac/

[2]Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1

[3]Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4

Note:
Time-table for winter semester 2011/2012:
Time-table is not available yet
Time-table for summer semester 2011/2012:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
Fri
Thu
Fri
roomKN:E-301
Vaněk T.
09:15–10:45
EVEN WEEK

(lecture parallel1)
Karlovo nám.
Šrámkova posluchárna K9
The course is a part of the following study plans:
Generated on 2012-7-9
For updated information see http://bilakniha.cvut.cz/en/predmet12353404.html