Information security and cryptography

Course: Informatics

Structural unit: Faculty of Computer Science and Cybernetics

Title
Information security and cryptography
Code
ННД.09.
Module type
Обов’язкова дисципліна для ОП
Educational cycle
Second
Year of study when the component is delivered
2023/2024
Semester/trimester when the component is delivered
1 Semester
Number of ECTS credits allocated
4
Learning outcomes
PLO5. To solve complex problems requiring systems with high computing power to ensure the scalability of parallel algorithms and programs. PLO8. To analyze the peculiarities of using modern quantum technologies in order to solve problems, in particular confidential communication, quantum cryptography, to carry out research on theoretical and experimental aspects of quantum informatics. PLO15. To master the methods of development and implementation of measures aimed at increasing the efficiency of information systems.
Form of study
Prerequisites and co-requisites
To successfully learn the discipline «Information security and cryptography» the student's academic level must meet the following requirements: tо know: basic components of information systems, foundations of algebra, probability theory and number theory. Level B1 technical English skills; be able to: develop, analyze and apply software systems to solve problems and applied tasks using modern software development methods.
Course content
Provides professional development for graduate students, aimed at forming the theoretical foundations and practical skills of information systems security, research and use of cryptographic algorithms and protocols to achieve information security goals. The discipline belongs to the list of obligatory academic disciplines. The course is taught in the first semester. It includes 2 semantic parts and a colloquium. The discipline ends with an exam.
Recommended or required reading and other learning resources/tools
1. H.Bidgoli (Ed.) Handbook of Information Security, Volume 1. JohnWiley&SonsInc., 2006. 2. H.Bidgoli (Ed.) Handbook of Information Security, Volume 2. JohnWiley&SonsInc., 2006. 3. H.Bidgoli (Ed.) Handbook of Information Security, Volume 3. JohnWiley&SonsInc., 2006. 4. N.Smart Cryptography made simple. Springer, 2016. 5. O.Verbіtskii Vstup do kriptologії. VNTL, 1998. 6. J.-P.Aumasson Serious cryptography. No starch press, 2018. 7. J. Katz, Y. Lindell Introduction to modern cryptography. CRC Press, 2015. 8. A. Narayanan, J. Bonneau, Ed. Felten, A. Miller, S. Goldfeder Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, 2016. 9. C. Paar, J. Pelzl Understanding cryptography. Springer, 2010.
Planned learning activities and teaching methods
Lectures, labs, individual work.
Assessment methods and criteria
Assessment during the semester: The maximum number of available points is 60. Colloquium – 15/9 points. Labs – 45/27 points. Final assessment in the exam form: The maximum number of available points is 40. Form in which exam is taking: written work. Types of tasks: 2 practical tasks and 1 theoretical task. Colloquium and exam tasks correspond to lectures and labs topics. Tasks of tests correspond to the practical classes’ content of the according part.
Language of instruction
Ukrainian language

Lecturers

This discipline is taught by the following teachers

Departments

The following departments are involved in teaching the above discipline