Lecturer(s)
|
-
Mlýnek Jaroslav, doc. RNDr. CSc.
|
Course content
|
1. Main reasons of electronic information securing a/ obligations arisen from valid legislative b/ commitments to other companies c/ own interests of companies 2. Cryptography - instrument to the ensuring of confidentiality, integrity and authenticity of information a/ basic definition (cryptography, cryptoanalysis, cryptology) b/ principle of encryption (plain text, cipher text, key) c/ encryption x coding 3. Introduction to number theory a/ fundamental terms b/ modular arithmetic 4. Classical cryptography a/ the substitution cipher b/ the transposition cipher c/ the stream cipher d/ the block cipher 5. Symmetric cipher a/ basic principle of encryption b/ a Vernam cipher 6. DES (Data Encryption Standard), Triple-DES 7. a/ AES (Advanced Encryption Standard Advanced Encryption Standard) b/ IDEA (International Data Encryption Algorithm) 8. Asymmetric cipher a/ basic principle of encryption b/ RSA cipher c/ other asymmetric ciphers 9. Digital signature a/ principle of digital signature b/ DSA (Digital Signature Algorithm) c/ most often use variations of digital signature 10. Digital signature and electronic signature, Electronic signature act n. 227/2000 11. Management of public keys of asymmetric encryption, a public key certificate, a certification authority (CA) 12. The principle of elliptic curve use in cryptography 13. Basic principles of coding
|
Learning activities and teaching methods
|
Monological explanation (lecture, presentation,briefing)
- Class attendance
- 42 hours per semester
- Preparation for credit
- 18 hours per semester
- Home preparation for classes
- 20 hours per semester
- Preparation for exam
- 30 hours per semester
- Semestral paper
- 10 hours per semester
|
Learning outcomes
|
The aim of the course is to inform students about the practical security implementation of electronic information. The subject offers basic information about methods of realisation of information system risk analysis including possible approaches to information evaluation, choosing adequate safeguards to secure confidentiality, integrity and availability of important information. Attention is focused on the use of cryptographic methods (hash functions, symmetric and asymmetric cryptosystems, digital signature, activities of certificate authority). Information security and present legislative system of the Czech Republic and the European Union will be explained as well.
Cryptography basic methods and use of these methods to security of electronic information.
|
Prerequisites
|
Basic course of higher mathematics
|
Assessment methods and criteria
|
Combined examination
Credit: participation on seminars Exam: written + oral part
|
Recommended literature
|
-
Bosáková, D. a kol.:. Elektronický podpis. GRADA Praha, 2002. ISBN 80-7263-125-X.
-
Mlýnek, J.:. Zabezpečení obchodních informací. Computer Press, Brno, 2007. ISBN 978-80-251-1511-4.
-
PELTIER, T. Information Security, Risk Analysis.. Taylor Francis, 2010.
-
Přibyl , J.:. Informační bezpečnost a utajování zpráv.. ČVUT, Praha, 2004. ISBN 80-01-02863-1.
-
Schneier, B.:. Applied Cryptography. John Wiley & sons, New York, USA, 1996. ISBN 0-471-59756-2.
-
STALLINGS, W., BROWN, L.:. Computer Security: Principles and Practice.. Pearson Prentice Hall, USA, 2008. ISBN 978-0-13-513711-6.
|