Cryptography and Information Security
Code | Completion | Credits | Range |
---|---|---|---|
B6B32KAB | Z,ZK | 5 | 2P + 2L + 2D |
- Course guarantor:
- Tomáš Vaněk
- Lecturer:
- Tomáš Vaněk
- Tutor:
- Filip Bělohlávek, Jaromír Hrad, Ivan Pravda, Tomáš Vaněk
- Supervisor:
- Department of Telecommunications Engineering
- Synopsis:
-
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.
- Requirements:
-
1. Knowledge of modular arithmetics and algebra.
2. ISO/OSI network model, knowledge of computer networks principle
3. Programming in high-level languages (Java,C#, C/C++)
- Syllabus of lectures:
-
1. Introduction to cryptology, historical overview
2. Block ciphers
3. Block ciphers modes of operation
4. Stream ciphers
5. Public key cryptosystems - IFP, DLP
6. Public key cryptosystems - ECC
7. Hash functions
8. Authentication protocols
9. Authorization protocols
10. Virtual Private Networks - IPsec, OpenVPN, Wireguard
11.Cryptographic protocols - SSL / TLS, DTLS, SSH
12. X.509 certificate, certificate authority public key infrastructure
13. Securing e-mail communication - S / MIME, PGP
14. Electronic signature, electronic identity
- Syllabus of tutorials:
-
1. Introduction, passing conditions, health and safety regulations
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Computer excercises - Cryptool I
6. Computer excercises - Cryptool II
7. Computer excercises - Cryptool III
8. Computer excercises - Cryptool IV
9. Laboratory exercises I
10. Laboratory exercises II
11. Laboratory exercises III
12. Laboratory exercises IV
13. Final Test
14. Assesment
- Study Objective:
- Study materials:
-
1) Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
3)Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/
- Note:
- Further information:
- https://moodle.fel.cvut.cz/courses/B6B32KAB
- Time-table for winter semester 2024/2025:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon Tue Wed Thu Fri - Time-table for summer semester 2024/2025:
- Time-table is not available yet
- The course is a part of the following study plans:
-
- Software Engineering and Technology (compulsory course in the program)