Popis předmětu - BE2M32IBEA
BE2M32IBEA | Information Security | ||
---|---|---|---|
Role: | PV | Rozsah výuky: | 2P + 2C |
Katedra: | 13132 | Jazyk výuky: | EN |
Garanti: | Bešťák R., Bezpalec P., Vaněk T. | Zakončení: | Z,ZK |
Přednášející: | Macejko P., Vaněk T. | Kreditů: | 6 |
Cvičící: | Osob je mnoho | Semestr: | L |
Anotace:
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today's world is created, transferred, stored in electronic form so information security is very important part of it. On successful completion of this course, students should be able to define the cryptographic primitives symmetric / asymmetric encryption, digital signatures, cryptographic hash function, and message authentication codes. They should be able to explain the security features offered by the latest versions of the most important security protocols operating on the TCP/IP stack (IPsec, TLS, SSH, PGP) and describe known attacks against these security protocols.Cíle studia:
The students should be able to select and apply the appropriate cryptographic primitives in different application scenarios. They should be able to select the appropriate security protocols in a given scenario and configure the appropriate options for the selection of the appropriate cryptographic building blocks applied within the studied protocols.Obsah:
The lecture consists of two parts. The first part covers the cryptographic basics including: Symmetric Encryption, Integrity protection, Asymmetric Encryption including elliptic curve cryptosystems, Digital Signatures, X.509 certificates and PKI, Authentication/Authorization and Key Agreement protocols. The second part is dedicated to Network Security including Kerberos, Radius, IPsec, OpenVPN, WireGuards, TLS/DTLS protocols, SSH, email security (S/MIME, PGP), VoIP security.Osnovy přednášek:
1. | Introduction to cryptology | |
2. | Block ciphers | |
3. | Cryptographic Modes of Operation; Stream ciphers | |
4. | Public key cryptosystems I 5. Public key cryptosystems II, Post-quantum cryptography | |
6. | Hash functions | |
7. | Authentication – biometrics, tokens, passwords | |
8. | Authentication and authorization protocols | |
9. | X.509 certificate, Certification Authority, PKI | |
10. | SSL/TLS, DTLS, SSH | |
11. | Virtual Private Network security - IPsec, OpenVPN, SSL-VPN | |
12. | Digital signature, Time Stamps, eIDAS directive | |
13. | Security in Data Networks | |
14. | VoIP security |
Osnovy cvičení:
1. | Introduction, passing conditions, health and safety regulations | |
2. | Cryptanalysis of monoalplhabetic substitutions | |
3. | Cryptanalysis of polyalphabetic substitutions | |
4. | Cryptanalysis of transposition ciphers | |
5. | Cryptanalysis of asymmetric key ciphers | |
6. | Mid-term test | |
7. | Introduction to laboratory exercises | |
8. | Laboratory exercises | |
9. | Laboratory exercises | |
10. | Laboratory exercises | |
11. | Laboratory exercises | |
12. | Laboratory exercises | |
13. | Final Test | |
14. | Assesment |
Literatura:
1) | Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4 | |
2) | Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1 | |
3) | Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/ |
Požadavky:
1. | Knowledge of modular arithmetics and algebra. | |
2. | ISO/OSI network model, knowledge of computer networks principles | |
3. | Programming in high-level languages (Java,C#, C/C++) |
Klíčová slova:
security, encryption, ciphers, cryptanalysis, authentication, authorization, cryptography, security protocols, network security, hash function, integrity, PKI, digital signaturePředmět je zahrnut do těchto studijních plánů:
Plán | Obor | Role | Dop. semestr |
MEEK6_2018 | Mobile Communications | PV | 2 |
MEEK5_2018 | Communication Systems and Networks | PV | 2 |
MEEK4_2018 | Technology of the Internet of Things | PV | 2 |
Stránka vytvořena 3.12.2024 17:51:08, semestry: L/2024-5, L/2023-4, Z/2024-5, Z/2025-6, připomínky k informační náplni zasílejte správci studijních plánů | Návrh a realizace: I. Halaška (K336), J. Novák (K336) |