This is a grouped Moodle course. It consists of several separate courses that share learning materials, assignments, tests etc. Below you can see information about the individual courses that make up this Moodle course.

Cryptography and Information Security - B6B32KAB

Main course
Credits 5
Semesters Winter
Completion Assessment + Examination
Language of teaching undefined
Extent of teaching 2P + 2L + 2D
Annotation
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.
Course outlines
1. Introduction to cryptology, historical overview
2. Block ciphers
3. Block ciphers modes of operation
4. Stream ciphers
5. Public key cryptosystems - IFP, DLP
6. Public key cryptosystems - ECC
7. Hash functions
8. Authentication protocols
9. Authorization protocols
10. Virtual Private Networks - IPsec, OpenVPN, Wireguard
11.Cryptographic protocols - SSL / TLS, DTLS, SSH
12. X.509 certificate, certificate authority public key infrastructure
13. Securing e-mail communication - S / MIME, PGP
14. Electronic signature, electronic identity
Exercises outlines
1. Introduction, passing conditions, health and safety regulations
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Computer excercises - Cryptool I
6. Computer excercises - Cryptool II
7. Computer excercises - Cryptool III
8. Computer excercises - Cryptool IV
9. Laboratory exercises I
10. Laboratory exercises II
11. Laboratory exercises III
12. Laboratory exercises IV
13. Final Test
14. Assesment
Literature
1) Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
2) Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
3)Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/

Requirements
1. Knowledge of modular arithmetics and algebra.
2. ISO/OSI network model, knowledge of computer networks principle
3. Programming in high-level languages (Java,C#, C/C++)

Communications Security - B4M36KBE

Credits 6
Semesters Summer
Completion Assessment + Examination
Language of teaching Czech
Extent of teaching 3P+2C
Annotation
The course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today's world is created, transferred, stored in electronic form so information security is very important part of it. On successful completion of this course, students should be able to define the cryptographic primitives symmetric / asymmetric encryption, digital signatures, cryptographic hash function, and message authentication codes. They should be able to explain the security features offered by the latest versions of the most important security protocols operating on the TCP/IP stack (IPsec, TLS, SSH, PGP) and describe known attacks against these security protocols.
Study targets
The students should be able to select and apply the appropriate cryptographic primitives in different application scenarios. They should be able to select the appropriate security protocols in a given scenario and configure the appropriate options for the selection of the appropriate cryptographic building blocks applied within the studied protocols.
Course outlines
1. Introduction to cryptology
2. Block ciphers
3. Cryptographic Modes of Operation; Stream ciphers
4. Public key cryptosystems I
5. Public key cryptosystems II, Post-quantum cryptography
6. Hash functions
7. Authentication – biometrics, tokens, passwords
8. Authentication and authorization protocols
9. X.509 certificate, Certification Authority, PKI
10. SSL/TLS, DTLS, SSH
11. Virtual Private Network security - IPsec, OpenVPN, SSL-VPN
12. Digital signature, Time Stamps, eIDAS directive
13. Security in Data Networks
14. VoIP security
Exercises outlines
1. Introduction, passing conditions, health and safety regulations
2. Cryptanalysis of monoalplhabetic substitutions
3. Cryptanalysis of polyalphabetic substitutions
4. Cryptanalysis of transposition ciphers
5. Cryptanalysis of asymmetric key ciphers
6. Mid-term test
7. Introduction to laboratory exercises
8. Laboratory exercises
9. Laboratory exercises
10. Laboratory exercises
11. Laboratory exercises
12. Laboratory exercises
13. Final Test
14. Assesment
Literature
Ferguson, Niels, Schneier, Bruce: Cryptography Engineering: Design Principles and Practical Applications
Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4
Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1
Bejtlich, Richard: The Practice of Network Security Monitoring: Understanding Incident Detection and Response, No Starch Press, 2013
Requirements
1. Knowledge of modular arithmetics and algebra.
2. ISO/OSI network model, knowledge of computer networks principles
3. Programming in high-level languages (Java,C#, C/C++)