Data protection (classes) (ćwiczenia) - 2019/2020
dr Michał Dolecki
Faculty of Science and Health - Instytut Matematyki, Informatyki i Architektury Krajobrazu
Number of hours (week/semester):
Language of instruction:
C1 - to familiarize students with the up-to-date principles, techniques, and algorithms of interest in cryptographic practice with emphasis placed on those aspects which are most practical and applied.
C2 - to present specific security solutions used in modern computer and telecommunication systems and networks.
W1 - knowledge of informatics covered by the high school program.
W2 - basic knowledge of discreet and modular arithmetic.
W4 - good computer skills.
W1 - Theoretical knowledge of information security goals, principles and application aspects (K_W01 K_W02 K_W07 K_W09),
W2 - Theoretical knowledge of cryptographic primitives and algorithms to provide basic security goals (K_W01 K_W02 K_W07 K_W09),
W3 - The student knows the principles of operation of symmetric encryption algorithms, both stream and block ciphers,
W4 - The student knows the principles of operation of asymmetric encryption algorithms,
W5 - The student knows the principles of operation hashing algorithms and functions,
W6 - The student has knowledge of the digital signature algorithms.
The student understands and can estimate the characteristics of cryptographic algorithms implementation in both software and hardware.
U1 - Ability to use specific technical measures to manage risks when processing personal data like: encryption, secure digital storage, back up data, secure digital communications, secure physical environment, secure disposal of data.
U2 - Ability to carry out risk analysis and threat modelling
U3 - Ability to apply models and guidelines for development of secure software applications
U4 - Ability to identify and use APIs for encryption and authentication for web applications (K_U01 K_U02 K_U03 K_U04 K_U05 K_U19).
SOCIAL SKILLS (ATTITUDES)
K1 - skillfully solve complex problems with which they can meet in life, using the known data protection principles, objectively assessing the results (K_K01 K_K03 K_K04 K_K08 K_K10).
K2 - follow ethical standards applicable in the IT industry (K_K06 K_K07).
K3 - work efficiently, in teams and individually, skillfully assessing priorities in the implementation of the project (K_K02 K_K03 K_K04 K_K05 K_K08).
Traditional lecture, conversational lecture with multimedia presentation, teaching methods supported by information techniques.
Practice classes in the computer lab equipped with multimedia projector and internet, dialog methods, problem methods, multimedia presentation, work in a group, individual classes with use of the computer, individual work with the student
Course content description
1. Introduction to Cryptography and Data Security
2. Symmetric Cryptography
3. Stream Ciphers
4. Block Ciphers
5. Public-Key Cryptography
6. The RSA Cryptosystem
7. Elliptic Curve Cryptosystems
8. Digital Signatures
9. Hash Functions
10. Message Authentication Codes
11. Key Establishment
Forms of assessment
2 colloquies in the semester
80 % - written answers to test tasks and oral answers in case of doubt,
20% - the grade obtained from the classes.
A grading scale is given below:
90 – 100% - very good (5.0),
80 – 89% - good plus (4.5),
70 – 79% - good (4.0),
60 – 69% - satisfactory plus (3.5),
50 – 59% - satisfactory (3.0),
Less than 50% - unsatisfactory (2.0).
W1, U1, U2 – written exam, laboratory work, preparation for classes
K1, K2, K3 – work and activity on classes
Hours realized in the scope of the study program:
Total number of hours with the participation of an academic teacher 60
Number of ECTS credits with the participation of an academic teacher 3
Studying literature 20
Preparation for the laboratory work 20
Preparation for the exam 20
Total number of hours of own work 60
Number of ECTS credits 2
Total number of ECTS credits for the module 5
Required reading list
1. Understanding Cryptography: A Textbook for Students and Practitioners, 1st ed. 2010 Edition, by Christof Paar, Jan Pelzl. Springer, 2010.
2. Stallings, W. Cryptography and Network Security: Principles and Practice (6th Edition). USA: Pearson, 2013.
3. Menezes A., Oorshot P., Vanstone S. Handbook of applied cryptography. – N.Y.: CRC Press Inc., 1996. – 816 p.
4. Understanding Privacy and Data Protection: What You Need to Know by Timothy J. Toohey, 2014.
5. Modern Cryptography: the Basic Terms. V. Emets, A. Melnyk, R. Popovych. Lviv, BAK, 2003. 144p.
1. T. Korkishko, A. Melnyk, V. Melnyk. „Algorithms and Processors of Symmetric Block Encryption. Series: Information Protection in Computer and Telecommunication Networks ”. Lviv, BAK, 2003, -169 pp.
2. Daemen J., Rijmen V. AES Proposal: Rijndael // First Advanced Encryption Standard(AES) Conference. – Ventura, CA, 1998.
3. FIPS 46, “Data Encryption Standard”, Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C.
4. American Bankers Association, Tripple Data Encryption Algorithm Modes of Operation, ANSI X9.52-1998, Washington, D.C., 1998.
5. FIPS 81, “Operational modes of DES”, Federal Information Processing Standard (FIPS), Publication 81, National Bureau of Standards, U.S. Department of Commerce, Washington D.C.
6. S. Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Anchor, 2000.
7. D. Kahn, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. 2nd edition, Scribner, 1996.
8. Cryptool, http://www.cryptool.de
9. D. R. Stinson, Cryptography: Theory and Practice, Chapman and Hall/CRC, 2005
Field of study: Informatics
Course listing in the Schedule of Courses:
Year II - Semester 3
Number of ECTS credits: 0
Form of assessment: Grade