Subject description - B2M32IBE

Summary of Study | Summary of Branches | All Subject Groups | All Subjects | List of Roles | Explanatory Notes               Instructions
B2M32IBE Information Security Extent of teaching:2+2c
Guarantors:Vaněk T. Roles:PV,V Language of
teaching:
CS
Teachers:Vaněk T. Completion:Z,ZK
Responsible Department:13132 Credits:5 Semester:Z

Anotation:

The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.

Course outlines:

1. Introduction to cryptology, historical overview
   2. Block ciphers    3. Block ciphers modes of operation    4. Stream ciphera    5. Public key cryptosystems    6. Hash functions    7. Authentication protocols    8. Virtual Private Networks - IPsec    9. Cryptographic protocols - SSL / TLS, DTLS, SSH   10. X.509 certificate, certificate authority public key infrastructure   11. Securing e-mail communication - S / MIME, PGP   12. Electronic signature, electronic identity   13. APT (Advanced Persistent Threats)   14. Laws and standards in the field of information security

Exercises outline:

1. Introduction, passing conditions, health and safety regulations
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Cryptanalysis of asymmetric key ciphers
6. Mid-term test
7. Introduction to laboratory exercises
8. Laboratory exercises
9. Laboratory exercises
10. Laboratory exercises
11. Laboratory exercises
12. Laboratory exercises
13. Final Test
14. Assesment

Literature:

1) Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
3) Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/

Requirements:

1. Knowledge of modular arithmetics and algebra.
2. ISO/OSI network model, knowledge of computer networks principles
3. Programming in high-level languages (Java,C#, C/C++)

Webpage:

https://moodle.fel.cvut.cz

Keywords:

security, cryptoghraphy, symmetric key algorithm, public key algorithms, network protocols, security protocols, hash function, authentication, integrity, confidentiality, malware, APT, PKI

Subject is included into these academic programs:

Program Branch Role Recommended semester
MPEK3_2016 Electronics V
MPEK4_2016 Media and Signal Processing V
MPEK2_2016 Radio and Optical Technology V
MPEK1_2016 Communication Systems and Networks PV 3


Page updated 18.9.2019 12:53:23, semester: Z,L/2020-1, L/2018-9, Z,L/2019-20, Send comments about the content to the Administrators of the Academic Programs Proposal and Realization: I. Halaška (K336), J. Novák (K336)