SylabUZ
Course name | Data safety and cryptography |
Course ID | 11.3-WE-INFP-DSaC-Er |
Faculty | Faculty of Computer Science, Electrical Engineering and Automatics |
Field of study | Computer Science |
Education profile | academic |
Level of studies | First-cycle Erasmus programme |
Beginning semester | winter term 2021/2022 |
Semester | 5 |
ECTS credits to win | 5 |
Course type | obligatory |
Teaching language | english |
Author of syllabus |
|
The class form | Hours per semester (full-time) | Hours per week (full-time) | Hours per semester (part-time) | Hours per week (part-time) | Form of assignment |
Lecture | 15 | 1 | - | - | Credit with grade |
Laboratory | 30 | 2 | - | - | Credit with grade |
Project | 15 | 1 | - | - | Credit with grade |
Principles of programming (but not obligatory).
Introduction: Fundamentals of cryptography and data safety, cryptosystems, basics of encryption and decryption, classic cryptography (transposition ciphers and substitution ciphers; Caesar cipher, Vigenère cipher, XOR, etc.). Implementation of the basic algorithms in programming languages.
Symmetric-key algorithms: Key management, block ciphers (DES, AES, Blowfish) and stream ciphers (RC4).
Optional: implementation in programming languages (C, C++, Java, Assembler, Pascal), hardware implementation (with programmable devices like FPGAs).
Asymmetric-key algorithms: Public and private keys, hash functions. Main protocols and cryptosystems (Diffie-Hellman, RSA, SHA, MD5, etc.).
Optional: Implementation in programming languages (C, C++, Assembler, Pascal). Hardware implementation (with programmable devices - FPGAs).
Digital signature: Fundamentals of digital signature, safety and authentication, smartcards.
Cryptanalysis: Main goals of cryptanalysis. Weakness of particular cryptosystems. Data safety. Debugging of computer applications and programs.
Data security and protection of applications: Fundamentals of data protection of programs and applications (based on MS Windows operation system). Processes management and debugging. Software debuggers and kernel mode debuggers.
Security in Web applications: Most popular attacks and protection methods (e.g. Cross-site scripting XSS, SQL-Injection).
Applied cybersecurity: protection of passwords, computer viruses and malware, firewalls, backups, SPAM.
Lecture, laboratory exercises, project.
Outcome description | Outcome symbols | Methods of verification | The class form |
Lecture – the passing condition is to obtain a positive mark from the final test (or other tasks given by the teacher).
Laboratory – the passing condition is to obtain positive marks from all laboratory exercises to be planned during the semester (or other tasks given by the teacher).
Project – the passing condition is to obtain a positive mark from all projects conducted during the semester (or other tasks given by the teacher).
Final mark components: lecture 30% + laboratory 40% + project 30%.
Modified by dr hab. inż. Remigiusz Wiśniewski, prof. UZ (last modification: 16-07-2021 22:31)