Course code InfT4026
Credit points 3
Total Hours in Course81
Number of hours for lectures16
Number of hours for seminars and practical classes16
Independent study hours49
Date of course confirmation06.09.2022
Responsible UnitInstitute of Computer Systems and Data Science
Dr. habil. sc. ing.
The aim of the study course is to familiarize students with the basic concepts, algorithms, protocols, standards and methods of cryptography and their applications in data protection. In practical work, students learn practical skills in using cryptography and data protection methods.
As study course acquirement results students get:
Knowledge about math cryptography algorithm using possibilities for data security, those realization resources and practical usage facility for network security;
Skills in using in practice information security resources and independent constructing “public keys” encryption algorithm;
Competence in working in groups or performing work individually, using information security methods and resources, also in discussing colleagues’ opinion and disputing it.
1. Problems to be solved in cryptography, basic concepts and classification of cryptographic algorithms. Classic information coding systems (lectures-1h, practical works-1h).
2. Symmetric encryption algorithms (lectures-1h, practical works-1h).
3. Asymmetric encryption algorithms (lectures-1h, practical work-1h).
4. Hash functions (lectures-1h, practical work-1h).
5. Key management (lectures-1h, practical works-1h).
6. Public-Key Infrastructures (PKI) (lectures-1h, practical work-1h) .
7. Digital signature (lectures-1h).
8. Standards and protocols used in Internet communication (lectures-1h, practical works-1h).
9. Security of wireless networks (lectures-1h).
10. Electronic mail security (lectures-1h)..
11. Security at IP level (lectures-1h, practical work-1h).
12. Malicious Software (lectures-1h, practical works-1h).
13. Offenders. Hacking methodology. Detection of offenders (lectures-1h, practical works-1h).
14. Firewalls (lectures-1h, practical works-1h).
15. Cloud computing security (lectures-1h).
16. Legal and ethical issues of data protection (lectures-1h).
As part of the course, students must complete the required practical work, pass 2 theoretical tests with a positive grade (test 1 - cryptography, test 2 - data security), and present their independent work.
The student chooses a topic from the offered current topics in cryptography and data protection (can propose their own topic) and prepares a presentation. The presentation and performance are evaluated.
The final grade of "passed" at the end of the course consists of 2 theoretical tests and an assessment of independent work.
1. Stallings W. Cryptography and Network Security: Principles and Practices. 7th edition. Person Education, 2020. 768 p.
2. Paar C., Pelzl J. Understanding Cryptography: A textbook for Students and Practitioners. Heidelberg; New York: Springer-Verlag, 2022. 390 p.(DSK bibliotēka)
1. Schneier B. Applied Cryptography. Protocols, Algorithms, and Source Code in C. Indianapolis, IN : Wiley, 2015. 758 p.
2. Smart N. Cryptography: An Introduction. McGraw-Hill College, 2004. 433 p.
3. Smart N. Cryptography Made Simple. Cham: Springer, 2016. 481 pp.
4. Mittelbach A., Fischlin M. The Theory of Hash Functions and Random Oracles An Approach to Modern Cryptography. Cham: Springer, 2021. 788 p.
5. van Oorschot P. C. Computer Security and the Internet Tools and Jewels from Malware to Bitcoin. Cham: Springer, 2021. 446 p.
6. Beaver K. Hacking For Dummies. 6th Edition. 2018. 416 p.(DSK bibliotēka)
Technical Resource and Course Web Site for Cryptography and Network Security. Pieejams: http://www.williamstallings.com/Crypto3e.html
Compulsory course in Computer Science and Computer Science and Information Technology for Sustainable Development.