Lecturer(s)
|
-
Čapek Jan, prof. Ing. CSc.
|
Course content
|
Introduction to cryptology, Shannon's theory of encryption, Symmetric and asymmetric ciphers, Vernam's and Hill's cipher, Public and private cryptography, Elliptic curves, Certification authority, Secure data transmission, Coding, Safe systems models, Data safety in networks, Firewalls, Steganography, Watermarking.
|
Learning activities and teaching methods
|
Monological explanation (lecture, presentation,briefing), Self-study (text study, reading, problematic tasks, practical tasks, experiments, research, written assignments)
- Class attendance
- 280 hours per semester
|
Learning outcomes
|
The aim of this course is learn theoretical knowledge about data security, secure data transfer and processing, focus on the organisational precaution include encryption. The student will be able to apply data security and information protection methods in praxis of the specific economic subjects, he/she will be able to chose suitable methods of information protection within the chosen subject.
Students obtain knowledge in given course in accordance with requirements and course programme.
|
Prerequisites
|
Unspecified
|
Assessment methods and criteria
|
Oral exam, Essay, Student's performance analysis
The student is lead to self-reliant work, when knowledge obtaining by his/her study is able to implant into his/her thesis. The problems solving by methods included within this subject are presented by student's self-reliant work. The student is able to defend his/her conclusions in the scientific discussion and implement it into his/her thesis
|
Recommended literature
|
-
BISHOP, M. Introduction to Computer Security.. Addison Wesley, 2005.
-
HENKERSON, D. at all. Guide to Elliptic Curve Cryptography.. Springer Verlag, 2004.
-
HUNTER,J., H., D. Information Security Handbook. Springer Verlag, 2001.
-
LEIXNER,M. PC zálohování a archivace dat. Grada, 1993.
-
MENEZES A. J., OORSCHOT P. C., VANSTONE S. A. Handbook of Applied Cryptography. CRC Press, 2001.
-
PELTIER, T. Information Security, Risk Analysis.. Taylor Francis, 2010.
-
ROTH, R. Introduction to Coding Theory.. Cambridge University Press, 2006.
-
SAED, K. PEJAS, J.,MOSDORF, R. Biometrics, Computer Security Systems and Artifical Intelligence Applications.. Springer Science, 2006.
-
SCHNEIER, B. Applied Cryptography, Protocols, Algorithms and source code in C. John Wiley & Sons, 2015. ISBN 978-1119096726.
-
SMITH, S., MARCHESINI, J. The Craft of System Security.. Adison Weseley, 2008.
-
STALLINGS, W. Cryptography and Network Security-principles and practices. Prentice Hall, 2005.
-
ZELENKA J., ČAPEK J., FRANCEK J., JANÁKOVÁ H. Ochrana dat. Kryptologie. Gaudeamus, Hradec Králové, 2003.
|