Code: BE2M32IBEA |
Information Security |
Lecturer: Ing. Tomáš Vaněk Ph.D. |
Weekly load: 2P + 2C |
Completion: A, EX |
Department: 13132 |
Credits: 6 |
Semester: S |
- Description:
-
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today's world is created, transferred, stored in electronic form so information security is very important part of it. On successful completion of this course, students should be able to define the cryptographic primitives symmetric / asymmetric encryption, digital signatures, cryptographic hash function, and message authentication codes. They should be able to explain the security features offered by the latest versions of the most important security protocols operating on the TCP/IP stack (IPsec, TLS, SSH, PGP) and describe known attacks against these security protocols.
- Contents:
-
1. Introduction to cryptology
2. Block ciphers
3. Cryptographic Modes of Operation; Stream ciphers
4. Public key cryptosystems I
5. Public key cryptosystems II, Post-quantum cryptography
6. Hash functions
7. Authentication ? biometrics, tokens, passwords
8. Authentication and authorization protocols
9. X.509 certificate, Certification Authority, PKI
10. SSL/TLS, DTLS, SSH
11. Virtual Private Network security - IPsec, OpenVPN, SSL-VPN
12. Digital signature, Time Stamps, eIDAS directive
13. Security in Data Networks
14. VoIP security
- Seminar contents:
-
1. Introduction, passing conditions, health and safety regulations
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Cryptanalysis of asymmetric key ciphers
6. Mid-term test
7. Introduction to laboratory exercises
8. Laboratory exercises
9. Laboratory exercises
10. Laboratory exercises
11. Laboratory exercises
12. Laboratory exercises
13. Final Test
14. Assesment
- Recommended literature:
-
1) Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
3)Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/
- Keywords:
- security, encryption, ciphers, cryptanalysis, authentication, authorization, cryptography, security protocols, network security, hash function, integrity, PKI, digital signature
Abbreviations used:
Semester:
- W ... winter semester (usually October - February)
- S ... spring semester (usually March - June)
- W,S ... both semesters
Mode of completion of the course:
- A ... Assessment (no grade is given to this course but credits are awarded. You will receive only P (Passed) of F (Failed) and number of credits)
- GA ... Graded Assessment (a grade is awarded for this course)
- EX ... Examination (a grade is awarded for this course)
- A, EX ... Examination (the award of Assessment is a precondition for taking the Examination in the given subject, a grade is awarded for this course)
Weekly load (hours per week):
- P ... lecture
- C ... seminar
- L ... laboratory
- R ... proseminar
- S ... seminar