Course detail

Communication System Security

FEKT-MKC-BKSAcad. year: 2023/2024

Modern civilization depends on a correct functioning of information systems. Significant attention must therefore be paid to the security of these systems. On completing the course, students will have a thorough overview of possible methods of securing an information system. Lectures are mainly dedicated to explaining the functioning of cryptography protections, communication protections, access control techniques, and computer protections. Exercises are computational ones and are dedicated to strengthening the theoretical knowledge and to considering quantitatively the different types of protection.

Language of instruction


Number of ECTS credits


Mode of study

Not applicable.

Entry knowledge

No special knowledge is required.

Rules for evaluation and completion of the course

20 points can be obtained for fulfilling the tasks in computational exercises and 80 points can be obtained for the examination. The examination is a written one and it is to check whether the student is able to explain the principles of different types of securing information systems.
Computational exercises are obligatory.


The goal of the course is to provide students with a good insight into the branch of information system security.
A student who completes the course will be able to:
• explain the principles of symmetric cryptosystems,
• explain the principles of asymmetric cryptosystems,
• explain the principles of the functioning of communication protections,
• explain the principles of the functioning of access control systems,
• explain the principles of the functioning of computer protections,
• explain the principles of emission protections,
• explain the principles of security evaluation.

Study aids

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

BURDA K.: Bezpečnost komunikačních systémů. Vysoké učení technické v Brně, Brno 2013. (CS)

Recommended reading

ROSS J. A.: Security Engineering. Wiley Publishing, Indianopolis, 2008. (EN)
BURDA, K.: Aplikovaná kryptografie. VUTIUM, Brno 2013. (CS)


Classification of course in study plans

  • Programme MKC-TIT Master's, 2. year of study, winter semester, compulsory

Type of course unit



26 hours, optionally

Teacher / Lecturer


1. Basics of cryptography
2. Symmetric cryptosystems
3. Asymmetric cryptosystems
4. Secure communication protocols
5. Error detection and correction codes
6. Protection of communication channels
7. Communication hiding and anonymisation
8. Access control
9. Data backup
10. Computer security
11. Compromise and parasitic channels
12. Security management and evaluations
13. Reserve 

Fundamentals seminar

26 hours, compulsory

Teacher / Lecturer


1. Application of secrecy theory
2. Operation of symmetric cryptography
3. Operation of asymmetric cryptography
4. Application of secure communication protocols
5. Application of error detection and correction codes
6. Application of signal spread spectrum methods
7. Application of communication hiding mechanisms
8. Application of access control mechanisms
9. Application of data backup theory
10. Application of SW and OS protection mechanisms
11. Application of emission protection
12. Application of risk analysis and management methods
13. Reserve