Přístupnostní navigace
E-application
Search Search Close
study programme
Original title in Czech: Informační bezpečnostFaculty: FEECAbbreviation: DPC-IBEAcad. year: 2020/2021
Type of study programme: Doctoral
Study programme code: P0688D060003
Degree awarded: Ph.D.
Language of instruction: Czech
Accreditation: 8.10.2019 - 7.10.2029
Mode of study
Full-time study
Standard study length
4 years
Programme supervisor
prof. Ing. Jaroslav Koton, Ph.D.
Doctoral Board
Chairman :prof. Ing. Jaroslav Koton, Ph.D.Councillor internal :doc. Ing. Ondřej Ryšavý, Ph.D.doc. Dr. Ing. Petr Hanáčekdoc. Ing. Karel Burda, CSc.doc. Ing. Václav Zeman, Ph.D.doc. Ing. Jan Hajný, Ph.D.prof. Ing. Jiří Mišurec, CSc.Councillor external :doc. Ing. Otto Dostál, CSc.
Fields of education
Study aims
The student is fostered to use the theoretical knowledge and experience gained through own research activities in an innovative manner. He is able to efficiently use the gathered knowledge for the design of own and prospective solutions within their further experimental development and applied research. The emphasis is put on gaining both theoretical and practical skill, ability of self-decisions, definition of research and development hypotheses to propose projects spanning from basic to applied research, ability to evaluation of the results and their dissemination as research papers and presentation in front of the research community.
Graduate profile
The study program aims at scientific preparation of doctoral students with deep theoretical knowledge of cryptography and system security. Most study courses are focused on applied mathematics, informatics and telecommunication technologies. The graduate has detailed knowledge about communication and information systems, data transfer and its security, including the use and design of software applications. She is able to analyze modern ciphers and cryptographic protocols, evaluate their security and propose their concrete usage in communication systems. She has a deep knowledge of operating systems, programming languages, database systems, distributed applications, etc. She is also experienced in task algoritmization. She is able to design novel technological solutions for telecommunications with high security standards. The graduate is able to understand and design modern cryptographic systems.
Profession characteristics
Graduates of the program "Information Security" will be positioned in research, development and design teams, in expert groups of production or business organizations, in the academic sphere and in other institutions involved in science, research, development and innovation, in all companies where communication systems and secure information transfer through data networks are being applied and used. Our graduates are particularly experienced in the analysis, design, creation or management of complex systems aimed for secure data transfer and processing, as well as in the programming, integration, support, maintenance or sale of these systems.
Fulfilment criteria
Doctoral studies are carried out according to the individual study plan, which will prepare the doctoral student in cooperation with the doctoral student at the beginning of the study. The individual study plan specifies all the duties stipulated in accordance with the BUT Study and Examination Rules, which the doctoral student must fulfill to successfully finish his studies. These responsibilities are time-bound throughout the study period, they are scored and fixed at fixed deadlines. The student enrolls and performs tests of compulsory courses, obligatory elective subjects with regard to the focus of his dissertation, and elective courses (English for PhD students, Solutions for Innovative Entries, Scientific Publishing from A to Z). The student may enroll for the state doctoral exam only after all the tests prescribed by his / her individual study plan have been completed. Before the state doctoral exam, the student prepares a dissertation thesis describing in detail the goals of the thesis, a thorough evaluation of the state of knowledge in the area of the dissertation solved, or the characteristics of the methods it intends to apply in the solution. The defense of the controversy that is opposed is part of the state doctoral exam. In the next part of the exam the student must demonstrate deep theoretical and practical knowledge in the field of cryptology, system security, network security and electrical engineering, electronics. The State Doctoral Examination is in oral form and, in addition to the discussion on the dissertation thesis, it also consists of thematic areas related to compulsory and compulsory elective subjects. To defend the dissertation, the student reports after the state doctoral examination and after fulfilling conditions for termination, such as participation in teaching, scientific and professional activity (creative activity) and at least a monthly study or work placement at a foreign institution or participation in an international creative project .
Study plan creation
The doctoral studies of a student follow the Individual Study Plan (ISP), which is defined by the supervisor and the student at the beginning of the study period. The ISP is obligatory for the student, and specifies all duties being consistent with the Study and Examination Rules of BUT, which the student must successfully fulfill by the end of the study period. The duties are distributed throughout the whole study period, scored by credits/points and checked in defined dates. The current point evaluation of all activities of the student is summarized in the “Total point rating of doctoral student” document and is part of the ISP. At the beginning of the next study year the supervisor highlights eventual changes in ISP. By October, 15 of each study year the student submits the printed and signed ISP to Science Department of the faculty to check and archive. Within the first four semesters the student passes the exams of compulsory, optional-specialized and/or optional-general courses to fulfill the score limit in Study area, and concurrently the student significantly deals with the study and analysis of the knowledge specific for the field defined by the dissertation thesis theme and also continuously deals with publishing these observations and own results. In the follow-up semesters the student focuses already more to the research and development that is linked to the dissertation thesis topic and to publishing the reached results and compilation of the dissertation thesis. By the end of the second year of studies the student passes the Doctor State Exam, where the student proves the wide overview and deep knowledge in the field linked to the dissertation thesis topic. The student must apply for this exam by April, 30 in the second year of studies. Before the Doctor State Exam the student must successfully pass the exam from English language course. In the third and fourth year of studies the student deals with the required research activities, publishes the reached results and compiles the dissertation thesis. As part of the study duties is also completing a study period at an abroad institution or participation on an international research project with results being published or presented in abroad or another form of direct participation of the student on an international cooperation activity, which must be proved by the date of submitting the dissertation thesis. By the end of the winter term in the fourth year of study students submit the elaborated dissertation thesis to the supervisor, who scores this elaborate. The final dissertation thesis is expected to be submitted by the student by the end of the fourth year of studies. In full-time study form, during the study period the student is obliged to pass a pedagogical practice, i.e. participate in the education process. The participation of the student in the pedagogical activities is part of his/her research preparations. By the pedagogical practice the student gains experience in passing the knowledge and improves the presentation skills. The pedagogical practice load (exercises, laboratories, project supervision etc.) of the student is specified by the head of the department based on the agreement with the student’s supervisor. The duty of pedagogical practice does not apply to students-payers and combined study program students. The involvement of the student in the education process within the pedagogical practice is confirmed by the supervisor in the Information System of the university.
What degree programme types may have preceded
The study program directly follows the Bachelor´s and Master´s study programs Information Security at FEKT, BUT.
Issued topics of Doctoral Study Program
When identifying offenders, the quality of the recording is often significantly affected by poor lighting conditions, low face resolution, masking part of the face or image artifacts caused by a high degree of image compression. Video recordings are often the only source of data that can be used as an evidence. The face identification is dealt with by the Criminalistics Institute in Prague, Audiovisual Department. The human eye and brain can recognize a person's face better from a sequence of images (i.e. video) than from a single still image. The objective of the research is to design methods based on artificial intelligence that will use sequence of face images and reconstruct the resulting face as a still image in better quality.
Tutor: Burget Radim, doc. Ing., Ph.D.
The topic is focused on research of side channel attacks. These attacks target the implementation of secure cryptographic algorithms that are currently applied. The main goal is to research and design countermeasures methods that can be used to eliminate these types of attacks. We assume research on modern methods of hiding and masking. The participation on Department’s research projects is expected.
Tutor: Martinásek Zdeněk, doc. Ing., Ph.D.
Fixed channel spacing distribution between separately data streams proves to be an insufficient technique. With the development of software-defined networks, there is a new trend in the reallocation of the spectrum, elastic optical network (EON). These networks react flexibly to the line occupation and predictively define spectrum allocation. With spectrum reallocation, individual interfaces may be blocked due to routing and wavelength assignment (RWA) and routing and spectrum assignment (RSA) spectrum sharing from/to access networks. Elastic optical networks can transfer the quantum key over short distances.
Tutor: Horváth Tomáš, Ing., Ph.D.
The study deals with forensic techniques to obtain evidence from the storage media and from volatile memory. Current methods will be tested on use-case studies. The goal is to propose methods for the analysis, implement them, and independently verify their effectiveness.
Tutor: Komosný Dan, prof. Ing., Ph.D.
The topic is focused on the area of the security of modern network infrastructures and services. The goal is the design of effective methods for the protection and vulnerability testing of high-speed networks against flood attacks and ISO/OSI model application layer attacks. The topic is also focused on the effective implementation of security algorithms.
Tutor: Zeman Václav, doc. Ing., Ph.D.
The topic deals with the issue of reliable information exchange between mobile nodes in FANET communication network. To ensure such feature, it is necessary to ensure sufficient knowledge of the communication node about its neighbors, i.e. other mobile nodes. The topic also deals with the orientation of the node, i.e. awareness of its position in user defined perimeter, where the node fulfills the given task. The results of the studies are new mechanisms ensuring efficient data exchange and also ability of reliable operation of the node, or a swarm of nodes, also under harsh conditions.
Tutor: Koton Jaroslav, prof. Ing., Ph.D.
The aim of this work is to study mathematical models of data communication with respect of anomaly detection. The anomaly may be caused by either change in the data traffic structure or security incidents. The work should explore capabilities and suitability of various mathematical models for utilization in distinguished types of network utilization: internet connectivity for household, small or large enterprise, server farms, ISP, ...
The topic is focused on research and design of new methods that can be used during the security testing (penetration test). The research is focused on suitable methods for web applications penetration testing, network infrastructure penetration testing, but also for penetration testing of dedicated devices such as smart meters. The participation on Department’s research projects is expected.
The topic is focused on research into and development of novel cryptographic algorithms, protocols and systems, in particular for the area of strong authentication and privacy protection. The main objective is to create a cryptographic scheme focused on strong security and optimization for constrained devices, such as smart cards, mobile devices or wearables. The participation on Department’s research projects is expected.
Tutor: Hajný Jan, doc. Ing., Ph.D.
Anomaly detection is a concept widely applied to numerous domains, such as financial fraud, cyber intrusion and many others. Within this topic, a doctoral student will focus on research and development of new principles and algorithms of anomaly detection using machine learning. The proposed principles will be applied mainly on the network traffic data with the goal to automatically identify anomalies in large datasets. Some of the fields, where the developed anomaly detection algorithms will be applied on, include network performance syslogs, network behaviour syslogs, and network security syslogs. As preferred research tools, student will primarily consider supervised and unsupervised machine learning concepts, as well as deep learning techniques. The developed algorithms will be verified through the numerical simulations as well as implementation in experimental networks.
Tutor: Hošek Jiří, doc. Ing., Ph.D.
The study deals with systems that are required to response independently of the current state of operation. The goal is to distribute the system resources to particular tasks (applications) in order not to interfere with each other. Example application are medical systems.
The study topic is focused on research of physical unclonable functions and their use in cryptographic protocols. Physical unclonable function (PUF) is a physical entity that is embodied in a physical structure and is easy to evaluate but hard to predict. PUF represent an alternative to safely store secret key cryptosystems.
The topic is focused on research into and development of post-quantum schemes running on Internet of Things (IoT) devices. The novel schemes have to be computationally competitive with current traditional protocols. The participation on department’s research projects is expected.
Tutor: Ricci Sara, M.Sc., Ph.D.
The topic is focused on research into and development of privacy awareness solution. At first, the student will deal with privacy breaches such as profiling users. Then, the student will come up with a solution to make users be aware of how much information can be disclosed about them on the Internet, and therefore, improve them privacy. The participation on department’s research projects is expected.
The dissertation theses deals with investigation in data and privacy protection, whereas it will be discussed whether the standards from the DSGVO offer a measurable competitive advantage. The theses aims to make a significant contribution to the formation of opinion and offers a basis for theory development as up to now there have been hardly any scientifically processed or valid studies in this area.
Tutor: Malina Lukáš, doc. Ing., Ph.D.
Today's digital world is dependent on data security during communication but also in storage, for example in e-banking, e-commerce, e-health or e-government. With the advent of quantum computers, there is a risk of potential security breaches today. Quantum Key Distribution (QKD) provides a way to distribute and share secret keys that are necessary for cryptographic protocols. The information is coded into individual photons. Integrating QKD systems into existing network infrastructure used for telecommunications is a topical challenge. Some other major challenges include increasing of the key rate, increasing the range of the QKD system, or reducing the complexity and robustness of existing solutions.
Tutor: Münster Petr, doc. Ing., Ph.D.
The aim of this work is to design methods and tools for verification of security and safety of equipment deployed for real operation. The work is mainly focused on end devices for power engineering and industry deployed within Smart Grids and Industry 4.0 concepts and their verification from the view of security threats and functional errors.
Tutor: Mlýnek Petr, doc. Ing., Ph.D.
The topic focuses on the analysis of security threats, the design of security solution based on modern cryptography and the optimization of solutions for upcoming intelligent networks such as Internet of Everything, Internet of Vehicles, 5G and Smart Cities. The research will focus on problems and solutions for communication security in decentralized networks and the adaptation and implementation of data privacy-enhancing technologies. The participation on Department’s national and international research projects is expected.
The aim is to analyse the up-to-date development and trends in the area of converged networks, mainly the problems of protection against cybernetic attacks. The areas of 5G mobile, SDN (Software Defined Networks) and related transmission technologies are seemed to be among the advanced possibilities. Design of innovative or new protection methods is supposed to be based on the obtained observation. The research requires orientation in networks area, experience with MATALB or SCILAB programs, and knowledge of at least one of VHDL, C or Java languages, evolutionary algorithms, and possibly use of the system FPGA.
Tutor: Škorpil Vladislav, doc. Ing., CSc.
The work will focus on research in the field of IP telephony security. It will include an analysis of protocols that providing VoIP telephony, known attacks, design and verification of new attacks. On the basis of the analyses will be proposed approaches to eliminate or minimize the impact of researched attacks on VoIP traffic. Individual approaches will be tested in practical implementations.
Tutor: Šilhavý Pavel, doc. Ing., Ph.D.
The topic is focused on research of new detection mechanisms in order to detect cyber attacks. The main goal is to research new detection mechanisms based on signatures or anomaly detection. The research will primarily focus on models that are created by machine learning algorithms and using the model to detect unknown malicious events (cyber attacks). The goal is also research of suitable correlation methods to detect these attacks. The participation on Department’s research projects is expected.
The topic is focused on research into and development of modern methods ensuring cybersecurity in systems and networks for supervisory control and data acquisition systems. To this purpose, the combined methods based on advanced anti-malware techniques, intrusion detection and prevention, and self-healing mechanisms will be used. Participation in the Department’s research projects is expected.
Tutor: Fujdiak Radek, doc. Ing., Ph.D.
The topic is focused on research of novel methods for the optimization of mainly asymmetric cryptographic algorithms for high-speed networks (100 Gbps and more) based on field programmable gate arrays (FPGAs). The participation on Department’s research projects is expected.
The topic is focused on research into and development of novel methods for intrusion detection systems in industrial control systems and networks. The main objective is to create a security layer with the capability to detect past and ongoing cyber incidents. This layer is represented by a system based on deep learning algorithms, pattern recognition and modern anomaly detection algorithms. Participation in the Department’s research projects is expected.
The topic focuses on the analysis, design and optimization of lightweight cryptography protocols and solutions. The main aspect of the research is to design solutions providing the security and data protection for Internet of Things (IoT) based on communication types such as D2D (device - device) and D2I (device - infrastructure). The research will focus on problems and solutions of applied cryptography on computational and memory constrained resources. The participation on Department’s national and international research projects is expected.
The aim is to analyse security aspects of the Software Defined Networks (SDN) technology. Optimization of existing and design of new algorithms against vulnerability of SDN will be proposed. New strategies are needed to secure the operation of the control plane, ensuring the controller is a priority. The attack vectors for SDN systems and share routes to secure the virtual network infrastructure that supports SDN and then the methods that are currently being considered in network protection play an important role. Due to the separation of the control plane from the data plane, there are several parts that must be protected from attackers. In addition to attacks on the controller, there are attacks on links, data plane devices, and applications. The application sphere of the research will be Blockchain-Based Distributed Trading in Energy Internet, smart grids, microgrids, solar energy systems and other current technologies. Selection and subsequent use of suitable simulation tools and other means is expected.