Logo ČVUT
Loading...
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2011/2012

Informační bezpečnost

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
A0M32IBE KZ 5 2+2c Czech
Lecturer:
Tomáš Vaněk (gar.)
Tutor:
Tomáš Vaněk (gar.), Jakub Doležal, Petr Hampl, Jaromír Hrad, Petr Jareš, Jan Kubr, Matěj Rohlík
Supervisor:
Department of Telecommunications Engineering
Synopsis:

The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.

Requirements:

Course evaluation: 50% written test, 50% individual project.

Syllabus of lectures:

1. Introduction to cryptology, basic terms

2. Steganography, Digital Watermarks, Digital Rights Management

3. Block ciphers - DES, AES, Camellia, Mars, Serpent, RC6, Blowfish

4. Stream ciphers (RC4, A5), Modes of Operation (ECB,CBC,OFB,CFB,CTR, CCMP ?)

5. Public Key Cryptosystems - RSA, El-Gamal, Diffie-Hellman, ECC

6. Hash functions - MD-5, SHA-1, SHA-2, RIPEMD, Whirlpool, Tiger

7. Authentication protocols

(Needham-Schröeder, RADIUS, TACACS, KERBEROS, DIAMETER, TESLA, TIK)

8. Protocol IPsec (AH, ESP, IKE, ISAKMP, Oakley)

9. SSL/TLS, WTLS, SSH

10. Security in LANs (ARP cache poisoning, DHCP spoofing); Denial of Service Attacks

11. WiFi/Bluetooth/WiMAX Security

12. GSM/ GPRS/UMTS Security

13. VoIP security (H.323, SIP, SCCP, Skype)

14. Digital Signature, Certificate, Time Stamps, Certification Authority

Syllabus of tutorials:

1. Agenda, BOZP.

2. Mathematical background

3. Google hacking

4. Cryptanalysis of Monoalphabetic Substitution Ciphers

5. Cryptanalysis of Polyalphabetic Substitution Ciphers

6. Cryptanalysis of Transposition Ciphers

7. Individual Project - Cryptanalysis of Historical Ciphers

8. Individual Project - Cryptanalysis of Historical Ciphers

9. Lab.1 - Security in Wireless Networks

10. Lab.2 - Virtual Private Networks based on IPsec

11. Lab.3 - Data Link Layer Attacks in LAN

12. Lab.4 - Simulation of Cryptographic Protocols Using CPN

13. Test, Assessment

Study Objective:

Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.

Study materials:

[1]Mao W., Modern Cryptography - Tudory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1

[2]Stamp M., Information Security - Principles and Praktice, Wiley, 2006, ISBN: 0-471-73848-4

Note:
Time-table for winter semester 2011/2012:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
roomT2:A4-204
Vaněk T.
11:00–12:30
(lecture parallel1)
Dejvice
Učebna
Fri
roomT2:B3-714
Vaněk T.
09:15–10:45
(lecture parallel1
parallel nr.101)

Dejvice
Laboratoř K332
roomT2:B3-714
Vaněk T.
11:00–12:30
(lecture parallel1
parallel nr.102)

Dejvice
Laboratoř K332
Thu
Fri
Time-table for summer semester 2011/2012:
Time-table is not available yet
The course is a part of the following study plans:
Generated on 2012-7-9
For updated information see http://bilakniha.cvut.cz/en/predmet12568404.html