Course detail

Cryptography and IT Security

FP-KIBAcad. year: 2011/2012

The course makes students familiar with basics of cryptology and information security, where the latter is covered in the areas of authentication, electronic signature, privacy. The opening of the course is dedicated to cryptology - its history, light mathematical background, block ciphers, random number generators, a couple of cryptanalysis examples. This is followed by authentication of data and users, authentication protocols. Next topis is a detailed overview of electronic signatures (archiving, time validity, signature creation/verification). The last large topis encounters privacy - definition of privacy, can it be measured, why it is becoming an issue. Final lectures go through a number of smaller areas. Secure devices, key management, and payment protocols.

Language of instruction

Czech

Number of ECTS credits

5

Mode of study

Not applicable.

Learning outcomes of the course unit

Passing this course, students will know basic notions in the area of cryptography and security, privacy, and also gain knowledge about actual issues in the area of information system security. They should be able to identify/analyse crucial issues of a given information system.

Prerequisites

There are no particular prerequisites required. Nevertheless, knowledge of English is an advantage.

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Teaching methods depend on the type of course unit as specified in the article 7 of BUT Rules for Studies and Examinations.

Assesment methods and criteria linked to learning outcomes

The classification is based on written assignments (25 %) and written half-term (25 %), and final exam (50 %). The classification is as common.

Course curriculum

1. Introduction
2. Basics of cryptology, mathematical background
3. Cryptographic primitives - block ciphers, hash functions, random number generators
4. Cryptanalysis - demonstration on a couple of recent cryptanalytic attacks
5. Authentication protocols
6. User authentication
7. Electronic signature - using the signature, life-cycle
8. Electronic signature - electronic signature act
9. Privacy - introduction, importance for ubicomp
10. Anonymising, traffic analysis
11. Using pseudonyms
12. Secure devices, key management
13. Secure data transmission, payment protocols

Work placements

Not applicable.

Aims

There are two basic goals of the course. The first one is to introduce students with modern cryptology. What are the limits of cryptanalysis, what algorithms are being used, basic errors that should be avoided and,of course, where can be cryptography applied.
The second goal is much more general survey of information secruity and familiarisation with hot issues. Students should be able to identify security requirements for information systems and have an idea about problems related to implementation of these requirements.

Specification of controlled education, way of implementation and compensation for absences

Students workout seminar assignments during the term and there is also a half-term exam. Students must obtain at least 50% of the maximum number of points to be allowed for the final exam.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

Anderson, R. Security Engineering (EN)
Mel, H.X. Decrypted Cryptography (EN)

Recommended reading

Not applicable.

Classification of course in study plans

  • Programme BAK-MIn Bachelor's

    branch BAK-MIn , 2 year of study, winter semester, compulsory

Type of course unit

 

Lecture

26 hod., optionally

Teacher / Lecturer

Exercise

13 hod., compulsory

Teacher / Lecturer