Faculty of Information Technology, BUT

Course details

Information System Security and Cryptography

BID Acad. year 2018/2019 Summer semester

Current academic year

Introduction, security standards, security management. Evaluation of security. Data transmission security, operating system and database security. Cryptographic algorithms and analysis, public key cryptography. Electronic commerce. Tamper resistant hardware.

Guarantor

Language of instruction

Czech

Completion

Examination

Time span

39 hrs lectures, 4 hrs projects

Assessment points

100 exam

Department

Lecturer

Subject specific learning outcomes and competences

Students will learn basic principles of secure information systems design and security analysis.

Learning objectives

To acquaint with with the advanced concepts of information systems security. The Another area covered is applied cryptography, including classical cryptography and modern secret key and public key cryptography.

Prerequisite kwnowledge and skills

Basic knowledge of operating systems and computer networks.

Study literature

  • Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0
  • Savard, J. J. G.: A Cryptographic Compendium, 2000, dostupné na WWW

Fundamental literature

  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography,  CRC Press Series on Discrete Mathematics and Its Applications,   Hardcover, 816 pages, CRC Press, 1997.

Syllabus of lectures

  1. Introduction
  2. Security standardisation
  3. Security management
  4. Security evaluation and audit
  5. Selected security mechanisms
  6. Advance cryptographic algorithms
  7. Public key infrastructure (PKI)
  8. Electronic commerce
  9. Tamper resistant hardware

Syllabus - others, projects and individual work of students

  1. Security analysis project

Controlled instruction

Project and presentation of selected article

Course inclusion in study plans

Back to top