Ciphers and information security

You don't have access to the course
This is a grouped Moodle course. It consists of several separate courses that share learning materials, assignments, tests etc. Below you can see information about the individual courses that make up this Moodle course.
Ciphers and information security (Main course) A7B32KBE
Credits 6
Semesters Summer
Completion Assessment + Examination
Language of teaching Czech
Extent of teaching 2P + 2L
Annotation
The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned.
Study targets
Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.
Course outlines
1. History of cryptology, Steganography and digital watermarking
2. Symmetric-key Algorithms I - DES, 3-DES, AES, RC4
3. Symmetric-key Algorithms II - MARS, Serpent, Blowfish, RC6
4. Public-key Algorithms - RSA, El-Gamal, ECC
5. Hash functions - MD5,SHA-x,, RIPEMD-160, Whirlpool, Tiger
6. Authentication protocols (Kerberos, RADIUS, TACACS)
7. Ipsec
8. SSL/TLS,WTLS
9. Security in Wirelles Networks - 802.11, 802.15, 802.16
10. Security in GSM, UMTS
11. Digital signature, Certificate Authorities
12. Quantum cryptography
13. Patents, standards, laws and recommendations for data protection.
Exercises outlines
1. Initial excercise, BOZP, Google hacking
2. Individual project
3. Cryptanalysis of the monoalphabetic substitution ciphers
4. Individual project
5. Cryptanalysis of the polyalphabetic substitution ciphers
6. Individual project
7. Cryptanalysis of the transposition ciphers
8. Individual project
9. Lab.1 - Authentication in LAN using IEEE 802.1x framework
10. Lab.2 - VPN using IPsec
11. Lab.3 - VPN using SSL/TLS
12. Test
13. Assesment
Literature
[1] Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, volně ke stažení na http://www.cacr.math.uwaterloo.ca/hac/
[2] Levický D., Kryptografia v informačnej bezpečnosti, elfa, 2005,ISBN:80-8086-022-X
[3] Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
[4] Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
Requirements
A7B01MCS - Mathematics for Computer Science

Evaluation of the course will be: 50% written exam, 50% individual project
Ciphers and Information Security AD7B32KBE
Credits 6
Semesters Summer
Completion Assessment + Examination
Language of teaching Czech
Extent of teaching 14P + 6C
Annotation
The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned. The course also contains a primer of quantum cryptography and cryptonalysis.
Study targets
Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.
Course outlines
1. Modular arithmetic essentials, Number theory essentials, Fundamental theorem of arithmetic
2. Mathematical fundaments of cryptograhy, Substitution ciphers
3. Block, transposition and exponential ciphers, key exchange.
4. Information theory, Complexity theory
5. Hashing functions, MD5, SHA-x, HMAC
6. Chinese Remainder Theorem, Prime number tests, Stream ciphers, RC4
7. Stream ciphers, block ciphers, DES, 3DES, AES, cipher operating modes
8. Asymmetric cryptography 1
9. Asymmetric cryptography 2
10. Shared secret
11. Quantum cryptography introduction
12. Introduction to cryptanalysis
13. Elliptic curve cryptography
14. Reserved
Exercises outlines
1. Modular arithmetic essentials 1
2. Modular arithmetic essentials 2, substitution ciphers, affine ciphers
3. Block, transposition, Vigenere, and exponential ciphers.
4. Information theory, complexity theory. NTL C++ library.
5. Hashing functions in C/C++
6. Prime number tests, RC4 stream cipher
7. Operations in GF(2^8), homework assignments
8. Individual work
9. Individual work
10. Individual work
11. Asymmetric cryptograhy
12. SSL encryption, homework consultations and evaluation
13. Homework consultations and evaluation, credit
14. Reserved
Literature
Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, free download at http://www.cacr.math.uwaterloo.ca/hac/
Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
Requirements
Final exam grading is in part derived from the quality of presented homework and activity at seminars.
Responsible for the data validity: Study Information System (KOS)