Cryptography and Network Security
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
B0M32KSB | Z,ZK | 6 | 2P+2L+4D | Czech |
- Course guarantor:
- Tomáš Vaněk
- Lecturer:
- Tomáš Vaněk
- Tutor:
- Filip Bělohlávek, Jaromír Hrad, Ivan Pravda, Tomáš Vaněk
- Supervisor:
- Department of Telecommunications Engineering
- Synopsis:
-
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.
- Requirements:
-
1. Modular arithmetics and algebra, basic statistics
2. ISO/OSI and TCP/IP network models, basic knowledge of computer networks principles
3. Programming in high-level languages (Java,C#, C/C++, Python) is an advantage
- Syllabus of lectures:
-
1.Introduction to cryptology, historical overview
2.Block ciphers
3.Block ciphers modes of operation
4.Stream ciphers
5.Public key cryptosystems
6.Hash functions
7.Biometrics, Tokens, Passwords
8. Authentication and Authorization protocols
9.Virtual Private Networks
10.Cryptographic protocols - SSL / TLS, DTLS, SSH
11.X.509 certificate, certificate authority, Public Key Infrastructure
12.E-mail communication security - S / MIME, PGP
13.Electronic signature, electronic identity
14.Security in mobile networks
- Syllabus of tutorials:
-
1.Introduction, passing conditions, health and safety regulations
2.Cryptanalysis of monoalplhabetic substitutions
3.Cryptanalysis of polyalphabetic substitutions
4.Cryptanalysis of transposition ciphers
5.Computer excercise - public key cryptosystems
6.Computer excercise - hash functions
7.Introduction to laboratory exercises
8.Laboratory exercises
9.Laboratory exercises
10.Laboratory exercises
11.Laboratory exercises
12.Laboratory exercises
13.Final Test
14.Assesment
- Study Objective:
-
Students acquire comprehensive overview on cryptography and network security. They'll study in detail principles of modern symmetric key and public key cryptosystems, hash functions as well as various security protocols and its usage in modern communication networks.
- Study materials:
-
Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
Paar Ch., Pelzl J., Understanding Cryptography, Springer, 2010, ISBN: 978-3-642-04100-6
- Note:
- Further information:
- https://moodle.fel.cvut.cz/courses/B0M32KSB
- Time-table for winter semester 2024/2025:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon Tue Wed Thu Fri - Time-table for summer semester 2024/2025:
- Time-table is not available yet
- The course is a part of the following study plans:
-
- Software Engineering and Technology (compulsory course in the program)
- Software Engineering and Technology (compulsory course in the program)
- Software Engineering and Technology (compulsory course in the program)
- Software Engineering and Technology (compulsory course in the program)
- Software Engineering and Technology (compulsory course in the program)