Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2024/2025

Communications Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
BE4M36KBE Z,ZK 6 3P+2C English
Relations:
During a review of study plans, the course B4M36KBE can be substituted for the course BE4M36KBE.
It is not possible to register for the course BE4M36KBE if the student is concurrently registered for or has already completed the course B4M36KBE (mutually exclusive courses).
It is not possible to register for the course BE4M36KBE if the student is concurrently registered for or has previously completed the course B4M36KBE (mutually exclusive courses).
Course guarantor:
Tomáš Vaněk
Lecturer:
Tomáš Vaněk
Tutor:
Jaroslav Burčík, Jaromír Hrad, Peter Macejko, Ivan Pravda, Tomáš Vaněk
Supervisor:
Department of Telecommunications Engineering
Synopsis:

The course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today's world is created, transferred, stored in electronic form so information security is very important part of it. On successful completion of this course, students should be able to define the cryptographic primitives symmetric / asymmetric encryption, digital signatures, cryptographic hash function, and message authentication codes. They should be able to explain the security features offered by the latest versions of the most important security protocols operating on the TCP/IP stack (IPsec, TLS, SSH, PGP) and describe known attacks against these security protocols.

Requirements:

1. Knowledge of modular arithmetics and algebra.

2. ISO/OSI network model, knowledge of computer networks principles

3. Programming in high-level languages (Java,C#, C/C++)

Syllabus of lectures:

1. Introduction to cryptology

2. Block ciphers

3. Cryptographic Modes of Operation; Stream ciphers

4. Public key cryptosystems I

5. Public key cryptosystems II, Post-quantum cryptography

6. Hash functions

7. Authentication – biometrics, tokens, passwords

8. Authentication and authorization protocols

9. X.509 certificate, Certification Authority, PKI

10. SSL/TLS, DTLS, SSH

11. Virtual Private Network security - IPsec, OpenVPN, SSL-VPN

12. Digital signature, Time Stamps, eIDAS directive

13. Security in Data Networks

14. VoIP security

Syllabus of tutorials:

1. Introduction, passing conditions, health and safety regulations

2. Cryptanalysis of monoalplhabetic substitutions

3. Cryptanalysis of polyalphabetic substitutions

4. Cryptanalysis of transposition ciphers

5. Cryptanalysis of asymmetric key ciphers

6. Mid-term test

7. Introduction to laboratory exercises

8. Laboratory exercises

9. Laboratory exercises

10. Laboratory exercises

11. Laboratory exercises

12. Laboratory exercises

13. Final Test

14. Assesment

Study Objective:

The students should be able to select and apply the appropriate cryptographic primitives in different application scenarios. They should be able to select the appropriate security protocols in a given scenario and configure the appropriate options for the selection of the appropriate cryptographic building blocks applied within the studied protocols.

Study materials:

Ferguson, Niels, Schneier, Bruce: Cryptography Engineering: Design Principles and Practical Applications

Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4

Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1

Bejtlich, Richard: The Practice of Network Security Monitoring: Understanding Incident Detection and Response, No Starch Press, 2013

Note:
Time-table for winter semester 2024/2025:
Time-table is not available yet
Time-table for summer semester 2024/2025:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
roomT2:B3-714

09:15–10:45
(lecture parallel1
parallel nr.101)

Dejvice
Wed
Thu
roomT2:C3-51
Vaněk T.
18:00–20:30
(lecture parallel1)
Dejvice
Fri
The course is a part of the following study plans:
Data valid to 2024-12-30
For updated information see http://bilakniha.cvut.cz/en/predmet4878906.html