Course details
Computer Security and Cryptography
BKR Acad. year 2005/2006 Summer semester 6 credits
Introduction, threats, weak points, security measures, criteria for system security assessment. Data transmission security, operating system and database security. Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption.
Guarantor
Language of instruction
Completion
Time span
- 39 hrs lectures
- 26 hrs projects
Department
Subject specific learning outcomes and competences
Students will learn basic principles of information systems security. They will learn also applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Students will learn the role of security and functionality in information systems.
Learning objectives
To acquaint with with the basic concepts of information systems security. The course aims to the security goals, security functions, and security mechanisms. Another area covered is applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Prerequisite knowledge and skills
Basic knowledge of operating systems and computer networks.
Study literature
- Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
- Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
- Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
- Menezes, A., Van Oorschot, P., Vanstone, A.: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW
Fundamental literature
- Menezes, A., Van Oorschot, P., Vanstone, A.: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
- Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0
Syllabus of lectures
- Introduction.
- Threats, vulnerabilities.
- Security measures.
- Criteria for system security assessment.
- Security functions.
- Data transmission security.
- Operating system and database security.
- Introduction to cryptography, basic cryptographic algorithms.
- Secret key encryption.
- Algorithms for secret key encryption.
- Public key encryption.
- Algorithms for public key encryption.
- Cryptography application examples.
Progress assessment
Study evaluation is based on marks obtained for specified items. Minimimum number of marks to pass is 50.
Controlled instruction
Mid-term exam