Information Security

Course page (outside Moodle)
This course is not present in Moodle. You can visit its homepage by clicking the "Course page (outside Moodle)" button on the right (if available).
Information Security AE0M32IBE
Credits 5
Semesters Summer
Completion Graded Assessment
Language of teaching English
Extent of teaching 2+2c
Annotation
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.
Study targets
Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.
Course outlines
1. Introduction to cryptology, basic terms
2. Ciphers I - Block Ciphers
3. Ciphers II - Modes of operation
4. Ciphers III - Stream ciphers
5. Ciphers IV - Public Key Cryptosystems
6. Hash functions
7. Security Protocols I - Authentication protocols
8. Security protocols II - IPsec
9. Security protocols III - SSL/TLS, DTLS, SSH
10. Security in Data Networks
11. Security in Wirelles Networks
12. Security in Mobile Networks
13. VoIP security
14. Public Key Infrastructure, Certificates and Certification Authorities
Exercises outlines
01. Agenda, BOZP.
02. Cryptanalysis of Monoalphabetic Substitution Ciphers
03. Cryptanalysis of Polyalphabetic Substitution Ciphers
04. Cryptanalysis of Transposition Ciphers
05. Introduciton to practical labs
06. Lab.1 - LAN Security
07. Individual Project
08. Lab.2 - Virtual Private Networks based on IPsec
09. Individual Project
10. Lab.3 - Data Link Layer Attacks in LAN
11. Individual Project
12. Lab.4 - VoIP Security
13. Individual Project
14. Final test, Assessment
Literature
[1] Mao W., Modern Cryptography - Tudory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
[2] Stamp M., Information Security - Principles and Praktice, Wiley, 2006, ISBN: 0-471-73848-4
Requirements
Knowledge of modular arithmetics and algebra.
Responsible for the data validity: Study Information System (KOS)