Subject description - AD0M32IBE

Summary of Study | Summary of Branches | All Subject Groups | All Subjects | List of Roles | Explanatory Notes               Instructions
AD0M32IBE Informační bezpečnost
Roles:V Extent of teaching:14P + 6C
Department:13132 Language of teaching:CS
Guarantors:  Completion:KZ
Lecturers:  Credits:5
Tutors:  Semester:L


The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.

Study targets:

Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.

Course outlines:

1. Introduction to cryptology, basic terms
2. Steganography, Digital Watermarks, Digital Rights Management
3. Block ciphers - DES, AES, Camellia, Mars, Serpent, RC6, Blowfish
4. Stream ciphers (RC4, A5), Modes of Operation (ECB,CBC,OFB,CFB,CTR, CCMP ?)
5. Public Key Cryptosystems - RSA, El-Gamal, Diffie-Hellman, ECC
6. Hash functions - MD-5, SHA-1, SHA-2, RIPEMD, Whirlpool, Tiger
7. Authentication protocols
8. Protocol IPsec (AH, ESP, IKE, ISAKMP, Oakley)
10. Security in LANs (ARP cache poisoning, DHCP spoofing); Denial of Service Attacks
11. WiFi/Bluetooth/WiMAX Security
12. GSM/ GPRS/UMTS Security
13. VoIP security (H.323, SIP, SCCP, Skype)
14. Digital Signature, Certificate, Time Stamps, Certification Authority

Exercises outline:

1. Agenda, BOZP.
2. Mathematical background
3. Google hacking
4. Cryptanalysis of Monoalphabetic Substitution Ciphers
5. Cryptanalysis of Polyalphabetic Substitution Ciphers
6. Cryptanalysis of Transposition Ciphers
7. Individual Project - Cryptanalysis of Historical Ciphers
8. Individual Project - Cryptanalysis of Historical Ciphers
9. Lab.1 - Security in Wireless Networks
10. Lab.2 - Virtual Private Networks based on IPsec
11. Lab.3 - Data Link Layer Attacks in LAN
12. Lab.4 - Simulation of Cryptographic Protocols Using CPN
13. Test, Assessment


[1] Mao W., Modern Cryptography - Tudory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
[2] Stamp M., Information Security - Principles and Praktice, Wiley, 2006, ISBN: 0-471-73848-4


Course evaluation: 50% written test, 50% individual project.



cryptography, cryptology, cipher, network, protocol, authentication, key, security

Subject is included into these academic programs:

Program Branch Role Recommended semester
MKEEM1 Technological Systems V
MKEEM5 Economy and Management of Electrical Engineering V
MKEEM4 Economy and Management of Power Engineering V
MKEEM3 Electrical Power Engineering V
MKEEM2 Electrical Machines, Apparatus and Drives V
MKKME1 Wireless Communication V
MKKME5 Systems of Communication V
MKKME4 Networks of Electronic Communication V
MKKME3 Electronics V
MKKME2 Multimedia Technology V
MKOI1 Artificial Intelligence V
MKOI5 Software Engineering V
MKOI4 Computer Graphics and Interaction V
MKOI3 Computer Vision and Image Processing V
MKOI2 Computer Engineering V
MKKYR4 Aerospace Systems V
MKKYR1 Robotics V
MKKYR3 Systems and Control V
MKKYR2 Sensors and Instrumentation V

Page updated 3.7.2020 17:51:56, semester: Z,L/2020-1, L/2019-20, Send comments about the content to the Administrators of the Academic Programs Proposal and Realization: I. Halaška (K336), J. Novák (K336)