Summer Semester 2010/11
Summer Semester 2011/12
Summer Semester 2012/13
Summer Semester 2013/14
Summer Semester 2014/15
Summer Semester 2015/16
Security of Computer Networks I36019
Course content:
1. Data security. Fundamental concepts of cryptography.
2. Transposition and Substitution ciphers.
3. Mono and Poly alphabetic substitution cipher.
4. Rotor machines. The Enigma: a unique rotor machine.
5. Data Encryption Standard (DES).
6. Advanced Encryption Standard (AES).
7. Number theory: Prime numbers. Euler's function. Euler's theorem. Congruence.
8. Public Key Cipher. One-way function.
9. RSA Cipher. Practical aspects.
10. Linear Feedback Shift Register: Pseudorandom key generation by LFSR.
11. Stream cipher.
12. Cryptographic Keys Management.
13. Communication Security.
14. Authentication Protocols. Password Authentication Protocol (PAP)
15. Firewalls. Malicious software and antivirus.
Course content - specialist lab: Analysis of selected problems introduced during lectures.
Learning outcomes: After the course the student will have a theoretical knowledge of the existing algorithms to encrypt and secure information.
(in Polish) Rodzaj przedmiotu
Course coordinators
Term 2011L: | Term 2010L: | Term 2013L: | Term 2012L: | Term 2015L: | Term 2014L: |
Bibliography
a) basic references:
1. Podstawy Kryptografii - M. Karboński
2. Wykład z teorii liczb i kryptografii - N. Koblitz
3. Kryptografia w teorii i praktyce - D.R. Stinson
4. Krzywe eliptyczne w kryptografii - I. Blade, G. Seroussi, N. Smart
5. Podpis elektroniczny - W. Dąbrowski, P. Kowalczuk
b) supplementary references:
6. Kryptografia w językach C i C++ - M. Welschenbach
7. Information hiding : steganography and watermarking-attacks and countermeasures - N.F. Johnson
8. Algebraiczne aspekty kryptografii - N. Koblitz
9. Kryptografia : teoria i praktyka zabezpieczania systemów komputerowych - M. Kutyłowski
10. Kryptografia i ochrona danych - D.E. Robling Denning
11. Ochrona danych i zabezpieczenia w systemach teleinformatycznych - J. Stokłosa