Subject description - BE2M32IBEA

Summary of Study | Summary of Branches | All Subject Groups | All Subjects | List of Roles | Explanatory Notes               Instructions
BE2M32IBEA Information Security
Roles:PV Extent of teaching:2P + 2C
Department:13132 Language of teaching:EN
Guarantors:Too many persons Completion:Z,ZK
Lecturers:Vaněk T. Credits:6
Tutors:Hampl P., Hrad J., Pravda I., Vaněk T. Semester:L


The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.

Study targets:

Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.

Course outlines:

1. Introduction to cryptology
   2. Block ciphers
3. Cryptographic Modes of Operation
   4. Stream ciphers
5. Random and Pseudoranmdom Number Generators
   6. Public key cryptosystems    7. Hash functions    8. Authentication protocols
9. Digital Signature, Certification Authority, PKI
10. Security in Wireless Networks
11. Security in Mobile networks (GSM, UMTS, LTE)
12. Virtual Private Network security - IPsec, OpenVPN, SSL-VPN
14. VoIP security

Exercises outline:

1. Introduction, passing conditions, health and safety regulations
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Cryptanalysis of asymmetric key ciphers
6. Mid-term test
7. Introduction to laboratory exercises
8. Laboratory exercises
9. Laboratory exercises
10. Laboratory exercises
11. Laboratory exercises
12. Laboratory exercises
13. Final Test
14. Assesment


1) Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
3) Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at


1. Knowledge of modular arithmetics and algebra.
2. ISO/OSI network model, knowledge of computer networks principles
3. Programming in high-level languages (Java,C#, C/C++)


security, encryption, ciphers, cryptanalysis, authentication, cryptography, security protocols, hash function, integrity, APT, PKI

Subject is included into these academic programs:

Program Branch Role Recommended semester
MEEK6_2018 Mobil Communications PV 2
MEEK4_2018 Technology of the Internet of Things PV 2
MEEK5_2018 Communication Systems and Networks PV 2

Page updated 3.7.2020 17:51:56, semester: Z,L/2020-1, L/2019-20, Send comments about the content to the Administrators of the Academic Programs Proposal and Realization: I. Halaška (K336), J. Novák (K336)