Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2024/2025

Cryptography and Network Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
B0M32KSB Z,ZK 6 2P+2L+4D Czech
Course guarantor:
Tomáš Vaněk
Lecturer:
Tomáš Vaněk
Tutor:
Filip Bělohlávek, Jaromír Hrad, Ivan Pravda, Tomáš Vaněk
Supervisor:
Department of Telecommunications Engineering
Synopsis:

The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.

Requirements:

1. Modular arithmetics and algebra, basic statistics

2. ISO/OSI and TCP/IP network models, basic knowledge of computer networks principles

3. Programming in high-level languages (Java,C#, C/C++, Python) is an advantage

Syllabus of lectures:

1.Introduction to cryptology, historical overview

2.Block ciphers

3.Block ciphers modes of operation

4.Stream ciphers

5.Public key cryptosystems

6.Hash functions

7.Biometrics, Tokens, Passwords

8. Authentication and Authorization protocols

9.Virtual Private Networks

10.Cryptographic protocols - SSL / TLS, DTLS, SSH

11.X.509 certificate, certificate authority, Public Key Infrastructure

12.E-mail communication security - S / MIME, PGP

13.Electronic signature, electronic identity

14.Security in mobile networks

Syllabus of tutorials:

1.Introduction, passing conditions, health and safety regulations

2.Cryptanalysis of monoalplhabetic substitutions

3.Cryptanalysis of polyalphabetic substitutions

4.Cryptanalysis of transposition ciphers

5.Computer excercise - public key cryptosystems

6.Computer excercise - hash functions

7.Introduction to laboratory exercises

8.Laboratory exercises

9.Laboratory exercises

10.Laboratory exercises

11.Laboratory exercises

12.Laboratory exercises

13.Final Test

14.Assesment

Study Objective:

Students acquire comprehensive overview on cryptography and network security. They'll study in detail principles of modern symmetric key and public key cryptosystems, hash functions as well as various security protocols and its usage in modern communication networks.

Study materials:

Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4

Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1

Paar Ch., Pelzl J., Understanding Cryptography, Springer, 2010, ISBN: 978-3-642-04100-6

Note:
Further information:
https://moodle.fel.cvut.cz/courses/B0M32KSB
Time-table for winter semester 2024/2025:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
Wed
roomT2:B3-714

07:30–09:00
(lecture parallel1)
Dejvice
roomT2:B3-714

16:15–17:45
(lecture parallel1)
Dejvice
roomT2:B3-714

18:00–19:30
(lecture parallel1)
Dejvice
roomT2:B3-714

09:15–10:45
(lecture parallel1)
Dejvice
roomT2:B3-714

11:00–12:30
(lecture parallel1)
Dejvice
roomT2:B3-714

12:45–14:15
(lecture parallel1)
Dejvice
roomT2:B3-714

14:30–16:00
(lecture parallel1)
Dejvice
Thu
roomT2:C3-135
Vaněk T.
16:15–17:45
(lecture parallel1)
Dejvice
Fri
Time-table for summer semester 2024/2025:
Time-table is not available yet
The course is a part of the following study plans:
Data valid to 2024-12-30
For updated information see http://bilakniha.cvut.cz/en/predmet6631906.html