CTU FEE Moodle
Cryptography and Information Security
B232 - Summer 23/24
This is a grouped Moodle course. It consists of several separate courses that share learning materials, assignments, tests etc. Below you can see information about the individual courses that make up this Moodle course.
Cryptography and Information Security - B6B32KAB
Main course
Credits | 5 |
Semesters | Winter |
Completion | Assessment + Examination |
Language of teaching | undefined |
Extent of teaching | 2P + 2L + 2D |
Annotation
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.
Study targets
No data.
Course outlines
1. Introduction to cryptology, historical overview
2. Block ciphers
3. Block ciphers modes of operation
4. Stream ciphers
5. Public key cryptosystems - IFP, DLP
6. Public key cryptosystems - ECC
7. Hash functions
8. Authentication protocols
9. Authorization protocols
10. Virtual Private Networks - IPsec, OpenVPN, Wireguard
11.Cryptographic protocols - SSL / TLS, DTLS, SSH
12. X.509 certificate, certificate authority public key infrastructure
13. Securing e-mail communication - S / MIME, PGP
14. Electronic signature, electronic identity
2. Block ciphers
3. Block ciphers modes of operation
4. Stream ciphers
5. Public key cryptosystems - IFP, DLP
6. Public key cryptosystems - ECC
7. Hash functions
8. Authentication protocols
9. Authorization protocols
10. Virtual Private Networks - IPsec, OpenVPN, Wireguard
11.Cryptographic protocols - SSL / TLS, DTLS, SSH
12. X.509 certificate, certificate authority public key infrastructure
13. Securing e-mail communication - S / MIME, PGP
14. Electronic signature, electronic identity
Exercises outlines
1. Introduction, passing conditions, health and safety regulations
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Computer excercises - Cryptool I
6. Computer excercises - Cryptool II
7. Computer excercises - Cryptool III
8. Computer excercises - Cryptool IV
9. Laboratory exercises I
10. Laboratory exercises II
11. Laboratory exercises III
12. Laboratory exercises IV
13. Final Test
14. Assesment
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Computer excercises - Cryptool I
6. Computer excercises - Cryptool II
7. Computer excercises - Cryptool III
8. Computer excercises - Cryptool IV
9. Laboratory exercises I
10. Laboratory exercises II
11. Laboratory exercises III
12. Laboratory exercises IV
13. Final Test
14. Assesment
Literature
1) Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
3)Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/
2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
3)Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/
Requirements
1. Knowledge of modular arithmetics and algebra.
2. ISO/OSI network model, knowledge of computer networks principle
3. Programming in high-level languages (Java,C#, C/C++)
2. ISO/OSI network model, knowledge of computer networks principle
3. Programming in high-level languages (Java,C#, C/C++)
Cryptography and Network Security - B0M32KSB
Credits | 6 |
Semesters | Winter |
Completion | Assessment + Examination |
Language of teaching | Czech |
Extent of teaching | 2P+2L+4D |
Annotation
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.
Study targets
Students acquire comprehensive overview on cryptography and network security. They'll study in detail principles of modern symmetric key and public key cryptosystems, hash functions as well as various security protocols and its usage in modern communication networks.
Course outlines
1. Introduction to cryptology, historical overview
2. Block ciphers
3. Block ciphers modes of operation
4. Stream ciphers
5. Public key cryptosystems
6. Hash functions
7. Biometrics, Tokens, Passwords
8. Authentication and Authorization protocols
9. Virtual Private Networks
10. Cryptographic protocols - SSL / TLS, DTLS, SSH
11. X.509 certificate, certificate authority, Public Key Infrastructure
12. E-mail communication security - S / MIME, PGP
13. Electronic signature, electronic identity
14. Security in mobile networks
2. Block ciphers
3. Block ciphers modes of operation
4. Stream ciphers
5. Public key cryptosystems
6. Hash functions
7. Biometrics, Tokens, Passwords
8. Authentication and Authorization protocols
9. Virtual Private Networks
10. Cryptographic protocols - SSL / TLS, DTLS, SSH
11. X.509 certificate, certificate authority, Public Key Infrastructure
12. E-mail communication security - S / MIME, PGP
13. Electronic signature, electronic identity
14. Security in mobile networks
Exercises outlines
1. Introduction, passing conditions, health and safety regulations
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Computer excercise - public key cryptosystems
6. Computer excercise - hash functions
7. Introduction to laboratory exercises
8. Laboratory exercises
9. Laboratory exercises
10. Laboratory exercises
11. Laboratory exercises
12. Laboratory exercises
13. Final Test
14. Assesment
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Computer excercise - public key cryptosystems
6. Computer excercise - hash functions
7. Introduction to laboratory exercises
8. Laboratory exercises
9. Laboratory exercises
10. Laboratory exercises
11. Laboratory exercises
12. Laboratory exercises
13. Final Test
14. Assesment
Literature
Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
Paar Ch., Pelzl J., Understanding Cryptography, Springer, 2010, ISBN: 978-3-642-04100-6
Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
Paar Ch., Pelzl J., Understanding Cryptography, Springer, 2010, ISBN: 978-3-642-04100-6
Requirements
1. Modular arithmetics and algebra, basic statistics
2. ISO/OSI and TCP/IP network models, basic knowledge of computer networks principles
3. Programming in high-level languages (Java,C#, C/C++, Python) is an advantage
2. ISO/OSI and TCP/IP network models, basic knowledge of computer networks principles
3. Programming in high-level languages (Java,C#, C/C++, Python) is an advantage
Cryptography and Information Security - BD6B32KAB
Credits | 5 |
Semesters | Winter |
Completion | Assessment + Examination |
Language of teaching | undefined |
Extent of teaching | 14P + 6C |
Annotation
No data.
Study targets
No data.
Course outlines
No data.
Exercises outlines
No data.
Literature
No data.
Requirements
No data.