Ciphers and information security

You don't have access to the course
Ciphers and information security A7B32KBE
Credits 6
Semesters Summer
Completion Assessment + Examination
Language of teaching Czech
Extent of teaching 2P + 2L
Annotation
The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned.
Study targets
Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.
Course outlines
1. History of cryptology, Steganography and digital watermarking
2. Symmetric-key Algorithms I - DES, 3-DES, AES, RC4
3. Symmetric-key Algorithms II - MARS, Serpent, Blowfish, RC6
4. Public-key Algorithms - RSA, El-Gamal, ECC
5. Hash functions - MD5,SHA-x,, RIPEMD-160, Whirlpool, Tiger
6. Authentication protocols (Kerberos, RADIUS, TACACS)
7. Ipsec
8. SSL/TLS,WTLS
9. Security in Wirelles Networks - 802.11, 802.15, 802.16
10. Security in GSM, UMTS
11. Digital signature, Certificate Authorities
12. Quantum cryptography
13. Patents, standards, laws and recommendations for data protection.
Exercises outlines
1. Initial excercise, BOZP, Google hacking
2. Individual project
3. Cryptanalysis of the monoalphabetic substitution ciphers
4. Individual project
5. Cryptanalysis of the polyalphabetic substitution ciphers
6. Individual project
7. Cryptanalysis of the transposition ciphers
8. Individual project
9. Lab.1 - Authentication in LAN using IEEE 802.1x framework
10. Lab.2 - VPN using IPsec
11. Lab.3 - VPN using SSL/TLS
12. Test
13. Assesment
Literature
[1] Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, volně ke stažení na http://www.cacr.math.uwaterloo.ca/hac/
[2] Levický D., Kryptografia v informačnej bezpečnosti, elfa, 2005,ISBN:80-8086-022-X
[3] Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
[4] Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
Requirements
A7B01MCS - Mathematics for Computer Science

Evaluation of the course will be: 50% written exam, 50% individual project
Responsible for the data validity: Study Information System (KOS)