Course details

Computer Security and Cryptography

BKR Acad. year 2003/2004 Summer semester 6 credits

Current academic year

Introduction, threats, weak points, security measures, criteria for system security assessment. Data transmission security, operating system and database security. Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption.

Details ...

Guarantor

Language of instruction

Czech

Completion

Examination

Time span

Department

Subject specific learning outcomes and competences

Students will learn basic principles of information systems security. They will learn also applied cryptography, including classical cryptography and modern secret key and public key cryptography.

Learning objectives

The goal is to make students familiar with the basic concepts of information systems security. The course aims to the security goals, security functions, and security mechanisms. Another area covered is applied cryptography, including classical cryptography and modern secret key and public key cryptography.

Study literature

  • Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
  • Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
  • Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
  • Menezes, A., Van Oorschot, P., Vanstone, A.: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW

Fundamental literature

  • Menezes, A., Van Oorschot, P., Vanstone, A.: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
  • Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0

Course inclusion in study plans

Back to top