Course details

Information System Security and Cryptography

BID Acad. year 2019/2020 Summer semester

Introduction, security standards, security management. Evaluation of security. Data transmission security, operating system and database security. Cryptographic algorithms and analysis, public key cryptography. Electronic commerce. Tamper resistant hardware.


Language of instruction




Time span

39 hrs lectures, 4 hrs projects

Assessment points

100 exam



Subject specific learning outcomes and competences

Students will learn basic principles of secure information systems design and security analysis.

Learning objectives

To acquaint with with the advanced concepts of information systems security. The Another area covered is applied cryptography, including classical cryptography and modern secret key and public key cryptography.

Prerequisite kwnowledge and skills

Basic knowledge of operating systems and computer networks.

Study literature

  • Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0
  • Savard, J. J. G.: A Cryptographic Compendium, 2000, dostupné na WWW

Fundamental literature

  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography,  CRC Press Series on Discrete Mathematics and Its Applications,   Hardcover, 816 pages, CRC Press, 1997.

Syllabus of lectures

  1. Introduction
  2. Security standardisation
  3. Security management
  4. Security evaluation and audit
  5. Selected security mechanisms
  6. Advance cryptographic algorithms
  7. Public key infrastructure (PKI)
  8. Electronic commerce
  9. Tamper resistant hardware

Syllabus - others, projects and individual work of students

  1. Security analysis project

Controlled instruction

Project and presentation of selected article

Course inclusion in study plans

Back to top