Security in computer systems
Study programs
Teaching information
Teaching form
Lecture, SeminarStudy method
AttendanceLanguage
slovenskýHours per week (full-time)
2,2Hours per semester (part-time)
LS 26,26Teachers
prof. Ing. Miloš Drutarovský, CSc.
Schedule
Learning outcomes
By completing subject student will get basic knowledge about methods, algorithms, protocols and tools used for maintaining privacy, integrity, authenticity, availability and non-repudiation of data origin. Gets overview about basic cryptographic building blocks (symmetric and asymmetric ciphers, hash functions, random number generators and digital signatures) used in design and implementation of computer systems.
Course outline
1. Computer security, introduction, basic concepts, principles and contexts 2. Symmetric ciphers 3. Public key cryptography I 4. Public key cryptography II 5. Hashing functions 6. Random number generators 7. Digital signatures, certificates 8. User authetication and data authorization 9. Protection of email communication, Malware 10. Trends of evolution in computer security
Completion conditions
Assessment and completion of the course: Credit test and examination Continuous assessment: Student passes the continuous assessment and receives credits when he or she meets the requirement to obtain at least 21% out of 40%. Test, semestral project Final assessment: Student passes the final assessment and passes the examination when he or she meets the requirement to obtain at least 31% out of 60%. Examination Overall assessment: Overall assessment is the sum of the assessments obtained by students in the assessment period. The overall result is determined in accordance with the internal regulations of the Technical University in Košice. (Study Regulations, the internal regulation principles of doctoral studies)
Recommended literature
1. Levický, D., Aplikovaná kryptografia, od utajenia správ ku kybernetickej bezpečnosti. Elfa, Košice, 2018 2. Drutarovský, M., Kryptografia pre vstavané procesorové systémy. Technická univerzita v Košiciach, 2017 3. Paar, Ch., Pelzl, J.,Understanding Cryptography. Springer, 2010 4. Stalling, W., Cryptography and Network Security, Pearson, 2017
Notes
To successfully complete the course, it is necessary to obtain a credit and successfully pass the exam. This includes the student's participation in educational activities of direct teaching, lectures, exercises, as well as independent study and independent creative activity of the student in processing the semester assignment / assignments, project on a specified topic, to a specified extent, in a specified design of a total of 180 hours intensity of the student's work per semester.
Grade distribution
Total graded students: 584