Information Security
Kód | Zakončení | Kredity | Rozsah | Jazyk výuky |
---|---|---|---|---|
BE2M32IBE | Z,ZK | 5 | 2P + 2C | anglicky |
- Garant předmětu:
- Přednášející:
- Cvičící:
- Předmět zajišťuje:
- katedra telekomunikační techniky
- Anotace:
-
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.
- Požadavky:
-
1. Knowledge of modular arithmetics and algebra.
2. ISO/OSI network model, knowledge of computer networks principles
3. Programming in high-level languages (Java,C#, C/C++)
- Osnova přednášek:
-
1. Introduction to Cryptology, Basic Terms, Historical Overview
2. Block ciphers
3. Cryptographic Modes of Operation
4. Stream Ciphers
5. Random and Pseudoranmdom Number Generators
6. Public-key Algorithms
7. Hash functions
8. Authentication Protocols
9. Digital Signature, Certification Authority
10. Security in Wireless Networks
11. Security in Mobile network
12. Virtual Private Network security - IPsec, OpenVPN, SSL-VPN
13. SSL/TLS, DTLS
14. VoIP security
- Osnova cvičení:
-
1. Introduction, passing conditions, health and safety regulations
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Cryptanalysis of asymmetric key ciphers
6. Mid-term test
7. Introduction to laboratory exercises
8. Laboratory exercises
9. Laboratory exercises
10. Laboratory exercises
11. Laboratory exercises
12. Laboratory exercises
13. Final Test
14. Assesment
- Cíle studia:
- Studijní materiály:
-
1) Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
3)Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/
- Poznámka:
- Další informace:
- https://moodle.fel.cvut.cz
- Pro tento předmět se rozvrh nepřipravuje
- Předmět je součástí následujících studijních plánů: