FEKT-NKRIAcad. year: 2015/2016
Security, security policy, security enforcement functions, security mechanisms, criteria for system security assessment. Mathematical foudations of cryptology. Substitution and transposition ciphers. Secret key encryption, AES data encryption standard, public key encryption, RSA system. Cryptographic keys and their management. Digital signatures, basic cryptographic protocols and their building blocks. Special algorithms for protocols, identification schemes. Security of data in computer networks. Internet and security, privacy protection. E-commerce security, application of cryptography in electronic publishing, legislative and ethical protection of data.
Learning outcomes of the course unit
Students will be introduced to applications of cryptographic mechanisms in communications and networks. They will learn the basic principles of information system security. They will also learn applied cryptography, including classical cryptography and modern secret key and public key cryptography.
The subject knowledge on the Bachelor´s degree level is requested.
Recommended optional programme components
Recommended or required reading
Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0
Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
Přibyl, J.- Kodl, J.: Ochrana dat v informatice. Monografie ČVUT, Praha 1997
Planned learning activities and teaching methods
Teaching methods depend on the type of course unit as specified in the article 7 of BUT Rules for Studies and Examinations.
Assesment methods and criteria linked to learning outcomes
Requirements for completion of a course are specified by a regulation issued by the lecturer responsible for the course and updated for every.
Language of instruction
The objective of this subject is to provide fundamental theoretical knowledge of and practical skills in data protection and data security in modern communication and information systems.
Specification of controlled education, way of implementation and compensation for absences
The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.