Cryptography and data security technologies  

The study course covers organizational and technological aspects related to cryptography and data security technologies. It provides the in-depth knowledge needed to protect corporate information resources through cryptographic technology. Basics of number theory, electronic signature, cryptography and cryptanalysis, digital forensics, steganography, privacy, cryptographic currency are considered. It provides an overview of data protection tasks and their solutions, substitution and permutation-based encryption algorithms, virtual private and wireless networks, their security protocols, authentication and authorization. Outcome: Understands the basic principles of numerical theory and their application in solving the problem. Able to characterize encryption algorithms based on substitution and permutation - Laboratory work Nr.1. Test Nr.1. Exam. Able to solve tasks using the Euler function, the Euclidean algorithm, and the theorem on the Fermi. Orienteering to encryption algorithms based on substitution and permutation. - Homework No.1. Able to characterize the DES standard. - Laboratory work Nr.2. Test Nr.2. Exam. Able to describe the 'Public Key' (RSA) algorithm and SSL / TLS encryption protocol. - Laboratory work Nr.3. Test Nr.3. Exam. Understands network security protocols. Able to characterize the Information Authentication and Electronic Signature Principles. - Laboratory work Nr.4. Test Nr.4. Exam. Able to describe PGP algorithm. - Laboratory work Nr.5. Test Nr.5. Exam. Able to describe computer viruses, antivirus programs. Able to characterize the methods of creating a firewall. - Laboratory work Nr.6. Test Nr.6. Exam.
Presential
English
Cryptography and data security technologies
English

Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or HaDEA. Neither the European Union nor the granting authority can be held responsible for them. The statements made herein do not necessarily have the consent or agreement of the ASTRAIOS Consortium. These represent the opinion and findings of the author(s).