460-4046/01 – Cryptography and Computer Security (KPB)
Gurantor department | Department of Computer Science | Credits | 4 |
Subject guarantor | RNDr. Eliška Ochodková, Ph.D. | Subject version guarantor | RNDr. Eliška Ochodková, Ph.D. |
Study level | undergraduate or graduate | | |
| | Study language | Czech |
Year of introduction | 2010/2011 | Year of cancellation | 2014/2015 |
Intended for the faculties | FEI | Intended for study types | Follow-up Master |
Subject aims expressed by acquired skills and competences
After graduation student will be able to:
1. Classify various kinds of attacks.
2. Classify particular security goals and security mechanisms dedicated to gain them.
3. Categorize cryptographic mechanisms.
4. Formulate mathematical background of cryptographic algorithms.
5. Design security mechanisms.
6. Demonstrate practical usage of cryptographic mechanisms and applied them.
7. Cooperate on project.
Teaching methods
Lectures
Tutorials
Summary
This subject provides an explanation of basic contents of IT security. It focuses on the symetric and public-key cryptography, cryptographic hash functions, authentication protocols, digital signatures and certificates. Course contains a survey of standards and covers legislative aspects of IT security.
Compulsory literature:
[1] Ochodková E., Matematické základy kryptografických algoritmů, http://mi21.vsb.cz/modul/matematicke-zaklady-kryptografickych-algoritmu
[2] Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999 a pozdější
[3] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7, October 1996, 816 pages, http://www.cacr.math.uwaterloo.ca/hac/
Recommended literature:
[1] Schneier B.: Applied cryptography, John Wiley & Sons, New York, 1995 (2nd edition)
[2] Pfleeger Ch.P.: Security in Computing, Prentice Hall, 1997 a pozdější
[3] Gollmann D.: Computer Security , Wiley 2000
Additional study materials
Way of continuous check of knowledge in the course of semester
Conditions for credit:
- Encompassing chosen project: problem understanding, algorithm selection, implementation, functionality of application, experiments and their results, project presentation. It is necessary to obtain at least (>=) 25 points from 45 possible.
Written exam (at least (>=) 20 points from 45 possible.
E-learning
Other requirements
Additional requirements are placed on the student.
Prerequisities
Subject has no prerequisities.
Co-requisities
Subject has no co-requisities.
Subject syllabus:
Lectures:
Introduction to information and data security. Basic concepts: attacks, risks, security functions and mechanisms, vulnerabilities.
Introduction to number theory.
Cryptography: basic concepts, cryptanalytic attacks.
Cryptography: classical techniques and its cryptanalysis.
Cryptography: symetric algorithms, basic concepts and principles, block cipher modes of operation, DES, AES.
Cryptography: aymetric algorithms (public-key cryptography), basic concepts and principles. RSA,
ELGamal.
Key management. Key exchange, Diffie-Hellman.
Authentication, authentication protocols, biometry.
Hash function, MAC.
Digital signature, DSS. Certificates, certificate authority.
Eliptic curve cryptography.
Firewalls, electronic mail security (PEM,
PGP, S/MIME), SSL.
Standards (ITSEC, ITSEM, Common Criteria,
ISO 9000,...) and legislative aspects of IT security.
Conditions for subject completion
Conditions for completion are defined only for particular subject version and form of study
Occurrence in study plans
Occurrence in special blocks
Assessment of instruction