Algorithms of Information Security
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
NI-AIB | Z,ZK | 5 | 2P+1C | Czech |
- Garant předmětu:
- Róbert Lórencz
- Lecturer:
- Martin Jureček, Róbert Lórencz
- Tutor:
- Martin Jureček, Olha Jurečková, Róbert Lórencz
- Supervisor:
- Department of Information Security
- Synopsis:
-
Students will get acquainted with the algorithms of secure key generation and cryptographic error (not only biometric) data processing. Furthermore, students will learn the mathematical principles of cryptographic protocols (identification, authentication, and signature schemes). Another part of the course is dedicated to malware detection and the use of machine learning in detection systems. The last topic includes practical steganographic methods and attacks on steganographic systems.
- Requirements:
-
Knowledge of linear algebra (BI-LIN), probability theory (BI-PST) and information security (BI-BEZ).
- Syllabus of lectures:
-
1. Key generation algorithms.
2. Self-correcting codes (basic definition, Reed-Muller codes).
3. Self-correcting codes (cyclic codes, Reed-Solomon, and BCH codes).
4. Cryptographic methods of error data processing (biometric data).
5. Cryptographic protocols: zero-knowledge proofs.
6. Cryptographic protocols: electronic signature and identification schemes.
7. Cryptographic protocols: key management, secret sharing.
8. Malware: basic types of malware and principles of analysis.
9. Malware: machine learning-based detection techniques.
10. Malware: algorithms for clustering into families.
11. Steganography: practical steganographic methods.
12. Steganography: attacks on steganographic systems.
- Syllabus of tutorials:
-
1. Key generation algorithms.
2. Self-correcting codes
3. Cryptographic protocols
4. Cryptographic protocols
5. Malware
6. Steganography
- Study Objective:
- Study materials:
-
1. Monnappa, K. A. : Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware. Packt Publishing, 2018. ISBN 978-1788392501.
2. Masud, M. - Thuraisingham, B. - Khan, L. : Data mining tools for malware detection. Auerbach Publications, 2011. ISBN 978-1439854549.
3. Clark, C. : Bitcoin Internals - A Technical Guide to Bitcoin. Amazon Digital Services, 2013.
4. Fridrich, J. : Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, 2009. ISBN 978-0521190190.
5. Mao, W. : Modern cryptography: theory and practice. Pearson Education India, 2003. ISBN 978-0132887410.
- Note:
- Further information:
- https://courses.fit.cvut.cz/NI-AIB/
- Time-table for winter semester 2024/2025:
- Time-table is not available yet
- Time-table for summer semester 2024/2025:
- Time-table is not available yet
- The course is a part of the following study plans:
-
- Master specialization Computer Science, in Czech, 2018-2019 (elective course)
- Master specialization Computer Security, in Czech, 2020 (PS)
- Master specialization Design and Programming of Embedded Systems, in Czech, 2020 (elective course)
- Master specialization Computer Systems and Networks, in Czech, 202 (elective course)
- Master specialization Management Informatics, in Czech, 2020 (elective course)
- Master specialization Software Engineering, in Czech, 2020 (elective course)
- Master specialization System Programming, in Czech, version from 2020 (elective course)
- Master specialization Web Engineering, in Czech, 2020 (elective course)
- Master specialization Knowledge Engineering, in Czech, 2020 (elective course)
- Master specialization Computer Science, in Czech, 2020 (elective course)
- Mgr. programme, for the phase of study without specialisation, ver. for 2020 and higher (VO)
- Master Specialization Digital Business Engineering, 2023 (VO)
- Master specialization System Programming, in Czech, version from 2023 (elective course)
- Master specialization Computer Science, in Czech, 2023 (elective course)