Summary of Study |
Summary of Branches |
All Subject Groups |
All Subjects |
List of Roles |
Explanatory Notes
Instructions
Web page:
https://moodle.fel.cvut.cz/courses/B0M32KSB
Anotation:
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.
Study targets:
Students acquire comprehensive overview on cryptography and network security. They'll study in detail principles of modern symmetric key and public key cryptosystems, hash functions as well as various security protocols and its usage in modern communication networks.
Course outlines:
1. | | Introduction to cryptology, historical overview |
2. | | Block ciphers |
3. | | Block ciphers modes of operation |
4. | | Stream ciphers |
5. | | Public key cryptosystems |
6. | | Hash functions |
7. | | Biometrics, Tokens, Passwords |
8. | | Authentication and Authorization protocols |
9. | | Virtual Private Networks |
10. | | Cryptographic protocols - SSL / TLS, DTLS, SSH |
11. | | X.509 certificate, certificate authority, Public Key Infrastructure |
12. | | E-mail communication security - S / MIME, PGP |
13. | | Electronic signature, electronic identity |
14. | | Security in mobile networks |
Exercises outline:
1. | | Introduction, passing conditions, health and safety regulations |
2. | | Cryptanalysis of monoalplhabetic substitutions |
3. | | Cryptanalysis of polyalphabetic substitutions |
4. | | Cryptanalysis of transposition ciphers |
5. | | Computer excercise - public key cryptosystems |
6. | | Computer excercise - hash functions |
7. | | Introduction to laboratory exercises |
8. | | Laboratory exercises |
9. | | Laboratory exercises |
10. | | Laboratory exercises |
11. | | Laboratory exercises |
12. | | Laboratory exercises |
13. | | Final Test |
14. | | Assesment |
Literature:
Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
Paar Ch., Pelzl J., Understanding Cryptography, Springer, 2010, ISBN: 978-3-642-04100-6
Requirements:
1. | | Modular arithmetics and algebra, basic statistics |
2. | | ISO/OSI and TCP/IP network models, basic knowledge of computer networks principles |
3. | | Programming in high-level languages (Java,C#, C/C++, Python) is an advantage |
Keywords:
authentication, authorization, cryptography, security protocol, hash function, data integrity, confidentiality, security, encryption, cipher, certificate
Subject is included into these academic programs:
Page updated 5.12.2024 17:51:30, semester: Z/2025-6, Z,L/2024-5, Send comments about the content to the Administrators of the Academic Programs |
Proposal and Realization: I. Halaška (K336), J. Novák (K336) |