BIE-BEZ – Security

Annotation

Students understand the mathematical fundamentals of cryptography and have an overview of current cryptographic algorithms and applications: symmetric and asymmetric cryptosystems, and hash functions. They also learn the fundamentals of secure programming and IT security, the fundamentals of designing and using modern cryptosystems for computer systems. They are able to properly and securely use cryptographic primitives and systems that are based on these primitives. Students are introduced to legal aspects of information security, security standards, social engineering, and basic principles of security management.

Lectures Program

  1. Fundamentals of modular arithmetic and number theory. Fundamental theorem of arithmetic.
  2. Properties of prime numbers. Exponentiation in modular arithmetic, fundamental concepts in cryptography, substitution ciphers.
  3. Block ciphers, transposition ciphers, exponential ciphers. Establishment of a shared key.
  4. Information theory, algorithm complexity theory.
  5. Hash functions, MD5, SHA-x, HMAC.
  6. Chinese remainder theorem, primality tests.
  7. Stream ciphers, RC4. Block ciphers, DES, 3DES, AES. Modes of operation of block ciphers.
  8. [2] Asymmetric cryptography, RSA, RSA-CRT, digital signature, certificates.
  9. Secret sharing.
  10. Principles of secure programming.
  11. IT security. Perimeter security, firewall, antivirus, antispam.
  12. Social engineering. Legal aspects of information security, standards.

Labs Program

  1. Fundamentals of modular arithmetic, substitution cipher, affine ciphers.
  2. Transposition, Vigenere cipher, block ciphers, exponential ciphers. Diffie-Hellman algorithm.
  3. Hash functions, stream ciphers.
  4. Primality tests, block ciphers.
  5. Certificates, asymmetric cryptography.
  6. SSL encryption.


Last modified: 7.9.2010, 11:09