Course detail
Cryptography and IT Security
FP-KIBAcad. year: 2012/2013
The course makes students familiar with basics of cryptology and information security, where the latter is covered in the areas of authentication, electronic signature, privacy. The opening of the course is dedicated to cryptology - its history, light mathematical background, block ciphers, random number generators, a couple of cryptanalysis examples. This is followed by authentication of data and users, authentication protocols. Next topis is a detailed overview of electronic signatures (archiving, time validity, signature creation/verification). The last large topis encounters privacy - definition of privacy, can it be measured, why it is becoming an issue. Final lectures go through a number of smaller areas. Secure devices, key management, and payment protocols.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
2. Basics of cryptology, mathematical background
3. Cryptographic primitives - block ciphers, hash functions, random number generators
4. Cryptanalysis - demonstration on a couple of recent cryptanalytic attacks
5. Authentication protocols
6. User authentication
7. Electronic signature - using the signature, life-cycle
8. Electronic signature - electronic signature act
9. Privacy - introduction, importance for ubicomp
10. Anonymising, traffic analysis
11. Using pseudonyms
12. Secure devices, key management
13. Secure data transmission, payment protocols
Work placements
Aims
The second goal is much more general survey of information secruity and familiarisation with hot issues. Students should be able to identify security requirements for information systems and have an idea about problems related to implementation of these requirements.
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Mel, H.X. Decrypted Cryptography (EN)
Recommended reading
Classification of course in study plans