Informační bezpečnost

B232 - Summer 23/24
This course is not present in Moodle. You can visit its homepage by clicking the "Course page (outside Moodle)" button on the right (if available).

Informační bezpečnost - AD0M32IBE

Credits 5
Semesters Summer
Completion Graded Assessment
Language of teaching Czech
Extent of teaching 14P + 6C
Annotation
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.
Study targets
Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.
Course outlines
1. Introduction to cryptology, basic terms
2. Steganography, Digital Watermarks, Digital Rights Management
3. Block ciphers - DES, AES, Camellia, Mars, Serpent, RC6, Blowfish
4. Stream ciphers (RC4, A5), Modes of Operation (ECB,CBC,OFB,CFB,CTR, CCMP ?)
5. Public Key Cryptosystems - RSA, El-Gamal, Diffie-Hellman, ECC
6. Hash functions - MD-5, SHA-1, SHA-2, RIPEMD, Whirlpool, Tiger
7. Authentication protocols
(Needham-Schröeder, RADIUS, TACACS, KERBEROS, DIAMETER, TESLA, TIK)
8. Protocol IPsec (AH, ESP, IKE, ISAKMP, Oakley)
9. SSL/TLS, WTLS, SSH
10. Security in LANs (ARP cache poisoning, DHCP spoofing); Denial of Service Attacks
11. WiFi/Bluetooth/WiMAX Security
12. GSM/ GPRS/UMTS Security
13. VoIP security (H.323, SIP, SCCP, Skype)
14. Digital Signature, Certificate, Time Stamps, Certification Authority
Exercises outlines
1. Agenda, BOZP.
2. Mathematical background
3. Google hacking
4. Cryptanalysis of Monoalphabetic Substitution Ciphers
5. Cryptanalysis of Polyalphabetic Substitution Ciphers
6. Cryptanalysis of Transposition Ciphers
7. Individual Project - Cryptanalysis of Historical Ciphers
8. Individual Project - Cryptanalysis of Historical Ciphers
9. Lab.1 - Security in Wireless Networks
10. Lab.2 - Virtual Private Networks based on IPsec
11. Lab.3 - Data Link Layer Attacks in LAN
12. Lab.4 - Simulation of Cryptographic Protocols Using CPN
13. Test, Assessment

Literature
[1] Mao W., Modern Cryptography - Tudory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
[2] Stamp M., Information Security - Principles and Praktice, Wiley, 2006, ISBN: 0-471-73848-4
[3] Paar Ch., Pelzl J., Understanding Cryptography, Springer, 2010, ISBN: 978-3-642-04100-6
Requirements
Course evaluation: 50% written test, 50% individual project.