Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2021/2022

Cryptography and Information Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range
B6B32KAB Z,ZK 5 2P + 2L + 2D
Lecturer:
Tomáš Vaněk (guarantor)
Tutor:
Petr Hampl, Tomáš Vaněk (guarantor), Jaromír Hrad, Ivan Pravda
Supervisor:
Department of Telecommunications Engineering
Synopsis:

The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.

Requirements:

1. Knowledge of modular arithmetics and algebra.

2. ISO/OSI network model, knowledge of computer networks principle

3. Programming in high-level languages (Java,C#, C/C++)

Syllabus of lectures:

1. Introduction to cryptology, historical overview

2. Block ciphers

3. Block ciphers modes of operation

4. Stream ciphers

5. Public key cryptosystems - IFP, DLP

6. Public key cryptosystems - ECC

7. Hash functions

8. Authentication protocols

9. Authorization protocols

10. Virtual Private Networks - IPsec, OpenVPN, Wireguard

11.Cryptographic protocols - SSL / TLS, DTLS, SSH

12. X.509 certificate, certificate authority public key infrastructure

13. Securing e-mail communication - S / MIME, PGP

14. Electronic signature, electronic identity

Syllabus of tutorials:

1. Introduction, passing conditions, health and safety regulations

2. Cryptanalysis of monoalplhabetic substitutions

3. Cryptanalysis of polyalphabetic substitutions

4. Cryptanalysis of transposition ciphers

5. Computer excercises - Cryptool I

6. Computer excercises - Cryptool II

7. Computer excercises - Cryptool III

8. Computer excercises - Cryptool IV

9. Laboratory exercises I

10. Laboratory exercises II

11. Laboratory exercises III

12. Laboratory exercises IV

13. Final Test

14. Assesment

Study Objective:
Study materials:

1) Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4

2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1

3)Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/

Note:
Further information:
https://moodle.fel.cvut.cz/courses/B6B32KAB
Time-table for winter semester 2021/2022:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
roomT2:C3-337
Vaněk T.
18:00–19:30
(lecture parallel1)
Dejvice
T2:C3-337
Wed
roomT2:B3-714
Pravda I.
Hrad J.

07:30–09:00
(lecture parallel1)
Dejvice
Laboratoř K132
roomT2:B3-714
Pravda I.
Hrad J.

09:15–10:45
(lecture parallel1)
Dejvice
Laboratoř K132
roomT2:B3-714
Hrad J.
Pravda I.

11:00–12:30
(lecture parallel1)
Dejvice
Laboratoř K132
roomT2:B3-714
Pravda I.
Hrad J.

12:45–14:15
(lecture parallel1)
Dejvice
Laboratoř K132
roomT2:B3-714
Pravda I.
Hrad J.

14:30–16:00
(lecture parallel1)
Dejvice
Laboratoř K132
Thu
Fri
Time-table for summer semester 2021/2022:
Time-table is not available yet
The course is a part of the following study plans:
Data valid to 2022-08-14
For updated information see http://bilakniha.cvut.cz/en/predmet3131206.html