Ciphers and information security
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
A7B32KBE | Z,ZK | 6 | 2+2s | Czech |
- The course cannot be taken simultaneously with:
- Data Transmission and Data Processing Security (Y36BEZ)
- Enrollement in the course requires an assessment of the following courses:
- Mathematics for Computer Science (A7B01MCS)
- Lecturer:
- Tomáš Vaněk (gar.)
- Tutor:
- Tomáš Vaněk (gar.), Jakub Doležal, Petr Hampl, Jaromír Hrad, Petr Chlumský, Petr Jareš, Jan Kubr, Vladimír Machula, Ivan Pravda, Matěj Rohlík, Michal Vondra, Ondřej Vondrouš
- Supervisor:
- Department of Telecommunications Engineering
- Synopsis:
-
The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned.
- Requirements:
-
A7B01MCS - Mathematics for Computer Science
Evaluation of the course will be: 40% written exam, 40% individual project, 20% assesment test
- Syllabus of lectures:
-
1. History of cryptology, Steganography and digital watermarking
2. Symmetric-key Algorithms I - DES, 3-DES, AES, RC4
3. Symmetric-key Algorithms II - MARS, Serpent, Blowfish, RC6
4. Public-key Algorithms - RSA, El-Gamal, ECC
5. Hash functions - MD5,SHA-x,, RIPEMD-160, Whirlpool, Tiger
6. Authentication protocols (Kerberos, RADIUS, TACACS)
7. Ipsec
8. SSL/TLS,WTLS
9. Security in Wirelles Networks - 802.11, 802.15, 802.16
10. Security in GSM, UMTS
11. Digital signature, Certificate Authorities
12. Quantum cryptography
13. Patents, standards, laws and recommendations for data protection.
- Syllabus of tutorials:
-
1. Initial excercise, BOZP, Google hacking
2. Individual project
3. Cryptanalysis of the monoalphabetic substitution ciphers
4. Individual project
5. Cryptanalysis of the polyalphabetic substitution ciphers
6. Individual project
7. Cryptanalysis of the transposition ciphers
8. Individual project
9. Lab.1 - Authentication in LAN using IEEE 802.1x framework
10. Lab.2 - VPN using IPsec
11. Lab.3 - VPN using SSL/TLS
12. Test
13. Assesment
- Study Objective:
-
Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.
- Study materials:
-
[1]Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, volně ke stažení na http://www.cacr.math.uwaterloo.ca/hac/
[2]Levický D., Kryptografia v informačnej bezpečnosti, elfa, 2005,ISBN:80-8086-022-X
[3]Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
[4]Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
- Note:
- Time-table for winter semester 2011/2012:
- Time-table is not available yet
- Time-table for summer semester 2011/2012:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon Tue Fri Thu Fri - The course is a part of the following study plans:
-
- Manažerská informatika (STM-A7B-přechodné) (compulsory course in the program)
- Softwarové inženýrství (STM-A7B-přechodné) (compulsory course in the program)
- Inteligentní systémy (STM-A7B-prechodné) (compulsory course in the program)
- Web a multimedia (STM-A7B-přechodné) (compulsory course in the program)
- Inteligentní systémy (STM-A7B) (compulsory course in the program)
- Manažerská informatika (STM-A7B) (compulsory course in the program)
- Softwarové inženýrství (STM-A7B) (compulsory course in the program)
- Web a multimedia (STM-A7B) (compulsory course in the program)