CTU FEE Moodle
Information Security
B232 - Summer 23/24
This is a grouped Moodle course. It consists of several separate courses that share learning materials, assignments, tests etc. Below you can see information about the individual courses that make up this Moodle course.
Information Security - B2M32IBEA
Main course
Credits | 6 |
Semesters | Summer |
Completion | Assessment + Examination |
Language of teaching | Czech |
Extent of teaching | 2P + 2C |
Annotation
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.
Study targets
No data.
Course outlines
1. Introduction to cryptology, historical overview
2. Block ciphers
3. Block ciphers modes of operation
4. Stream ciphera
5. Public key cryptosystems
6. Hash functions
7. Authentication protocols
8. Virtual Private Networks - IPsec
9. Cryptographic protocols - SSL / TLS, DTLS, SSH
10. X.509 certificate, certificate authority public key infrastructure
11. Securing e-mail communication - S / MIME, PGP
12. Electronic signature, electronic identity
13. APT (Advanced Persistent Threats)
14. Laws and standards in the field of information security
2. Block ciphers
3. Block ciphers modes of operation
4. Stream ciphera
5. Public key cryptosystems
6. Hash functions
7. Authentication protocols
8. Virtual Private Networks - IPsec
9. Cryptographic protocols - SSL / TLS, DTLS, SSH
10. X.509 certificate, certificate authority public key infrastructure
11. Securing e-mail communication - S / MIME, PGP
12. Electronic signature, electronic identity
13. APT (Advanced Persistent Threats)
14. Laws and standards in the field of information security
Exercises outlines
1. Introduction, passing conditions, health and safety regulations
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Cryptanalysis of asymmetric key ciphers
6. Mid-term test
7. Introduction to laboratory exercises
8. Laboratory exercises
9. Laboratory exercises
10. Laboratory exercises
11. Laboratory exercises
12. Laboratory exercises
13. Final Test
14. Assesment
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Cryptanalysis of asymmetric key ciphers
6. Mid-term test
7. Introduction to laboratory exercises
8. Laboratory exercises
9. Laboratory exercises
10. Laboratory exercises
11. Laboratory exercises
12. Laboratory exercises
13. Final Test
14. Assesment
Literature
1) Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
2) Anderson R., Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd edition, Cambridge University, 2008, ISBN: 978-0470068526
available at https://www.cl.cam.ac.uk/~rja14/book.html
3) Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/
4) Stamp M., Information Security - Principles and Practice, 3rd edition, Wiley, 2021, ISBN: 987-1119505907
2) Anderson R., Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd edition, Cambridge University, 2008, ISBN: 978-0470068526
available at https://www.cl.cam.ac.uk/~rja14/book.html
3) Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/
4) Stamp M., Information Security - Principles and Practice, 3rd edition, Wiley, 2021, ISBN: 987-1119505907
Requirements
1. Knowledge of modular arithmetics and algebra.
2. ISO/OSI network model, knowledge of computer networks principles
3. Programming in high-level languages (Python, Java,C#...)
2. ISO/OSI network model, knowledge of computer networks principles
3. Programming in high-level languages (Python, Java,C#...)
Information Security - B2M32IBE
Credits | 5 |
Semesters | Winter |
Completion | Assessment + Examination |
Language of teaching | Czech |
Extent of teaching | 2P + 2C |
Annotation
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.
Study targets
No data.
Course outlines
1. Introduction to cryptology, historical overview
2. Block ciphers
3. Block ciphers modes of operation
4. Stream ciphera
5. Public key cryptosystems
6. Hash functions
7. Authentication protocols
8. Virtual Private Networks - IPsec
9. Cryptographic protocols - SSL / TLS, DTLS, SSH
10. X.509 certificate, certificate authority public key infrastructure
11. Securing e-mail communication - S / MIME, PGP
12. Electronic signature, electronic identity
13. APT (Advanced Persistent Threats)
14. Laws and standards in the field of information security
2. Block ciphers
3. Block ciphers modes of operation
4. Stream ciphera
5. Public key cryptosystems
6. Hash functions
7. Authentication protocols
8. Virtual Private Networks - IPsec
9. Cryptographic protocols - SSL / TLS, DTLS, SSH
10. X.509 certificate, certificate authority public key infrastructure
11. Securing e-mail communication - S / MIME, PGP
12. Electronic signature, electronic identity
13. APT (Advanced Persistent Threats)
14. Laws and standards in the field of information security
Exercises outlines
1. Introduction, passing conditions, health and safety regulations
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Cryptanalysis of asymmetric key ciphers
6. Mid-term test
7. Introduction to laboratory exercises
8. Laboratory exercises
9. Laboratory exercises
10. Laboratory exercises
11. Laboratory exercises
12. Laboratory exercises
13. Final Test
14. Assesment
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Cryptanalysis of asymmetric key ciphers
6. Mid-term test
7. Introduction to laboratory exercises
8. Laboratory exercises
9. Laboratory exercises
10. Laboratory exercises
11. Laboratory exercises
12. Laboratory exercises
13. Final Test
14. Assesment
Literature
1) Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
3)Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/
2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
3)Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/
Requirements
1. Knowledge of modular arithmetics and algebra.
2. ISO/OSI network model, knowledge of computer networks principles
3. Programming in high-level languages (Java,C#, C/C++)
2. ISO/OSI network model, knowledge of computer networks principles
3. Programming in high-level languages (Java,C#, C/C++)