Cryptographic Systems and Protocols

Major: Cybersecurity
Code of subject: 6.125.00.O.077
Credits: 5.00
Department: Information Security
Lecturer: Ph.D., Associate Professor Horpenyuk A.Y.
Semester: 6 семестр
Mode of study: денна
Learning outcomes: Learning outcomes: LO 6. Critically interpret the main theories, principles, methods and concepts in education and professional activity. Teaching and learning methods: Lectures, classes - informational and perceptive method. Methods of evaluating the achievement of learning outcomes: Current verification in the process of assimilation of each topic being studied; evaluation of the student's activity in the course of lectures; exam - test control and oral survey. LO 15. Knowledge of mathematical models of information security and information protection tasks. LO 19. Knowledge of mathematical models of information security and information protection tasks. Teaching and learning methods: Lecture classes – informational and perceptive method. Practical classes and laboratory works - reproductive method, heuristic method, Independent work - research method. Methods of evaluating the achievement of learning outcomes: Current verification in the process of assimilation of each topic being studied; evaluation of the student's activity in the process of practical classes; checking the performance of laboratory work; verification of practical works; verification of performance of control work; an oral survey on the assimilation of knowledge acquired in the process of performing laboratory work. LO 20. Knowledge of basic approaches to the organization of typical complexes and means of information protection in information and communication systems. Teaching and learning methods: Lectures – information-perceptive method, method of problem presentation. Methods of evaluating the achievement of learning outcomes: Current verification in the process of assimilation of each topic being studied; evaluation of the student's activity in the process of practical classes; checking the performance of laboratory work; verification of practical works; verification of performance of control work; an oral survey on the assimilation of knowledge acquired in the process of performing laboratory work.
Required prior and related subjects: • Discrete Math, • Circuitry, • Complex information protection systems, • Hardware cryptography.
Summary of the subject: Introduction. Methods and algorithms of classical cryptography. Symmetric block ciphers and ways to improve them. Asymmetric cryptosystems. Problems of two-key cryptography and directions of cryptography development.
Assessment methods and criteria: • written reports on laboratory work, oral examination (30%); • final control (70 %, control measure, exam): written-oral form (70%).
Recommended books: 1. Горпенюк А.Я. Електронний навчально-методичний комплекс «Криптографічні системи та протоколи» у Віртуальному середовищі Львівської політехніки. 2. Бобало Ю.Я. Інформаційна безпека: навч. посібник / Ю.Я.Бобало, І.В.Горбатий, М.Д.Кіселичник, А.П.Бондарєв, С.С.Войтусік, А.Я.Горпенюк, О.А.Нємкова, І.М.Журавель, Б.М.Березюк, Є.І.Яковенко, В.І.Отенко, І.Я.Тишик; за заг. ред. д-ра. техн. наук, проф. Ю.Я.Бобала та д-ра техн. наук, доц. І.В.Горбатого. – Львів: Видавництво Львівської політехніки, 2019. – 580 с. 35,9 обл.-вид. арк. Рекомендований Науково-методичною радою Національного університету “Львівська політехніка” 3. О.В.Вербіцький. Вступ до криптології. Львів., "ВНТЛ", 1998. 4. Гулак Г.Н., Мухачев В.А., Хорошко В.А. Основи криптографічного захисту інформації. – К.: Вид. ДУІКТ, 2009. – 228 с.: іл. 5. Кузнецов Г.В., Фомичов В.В., Сушко С.О., Фомичова Л.Я. Математичні основи криптографії: Навч. Посібник/ Дніпропетровськ: Національний гірничий університет, 2004. – Ч.1. – 391с. 6. Симетричний блоковий шифр "Калина” – новий національний стандарт України / І. Д. Горбенко, Р. В. Олійников, О. В. Казимиров, В. І. Руженцев, О. О. Кузнєцов, Ю. І. Горбенко, О. В. Дирда, В. І. Долгов, А. І. Пушкарьов, Р. І. Мордвінов // Радиотехника. - 2015. - Вып. 181. - С. 5-22. 7. ДСТУ 7624:2014. Інформаційні технології. Криптографічний захист інформації. Алгоритм симетричного блокового перетворення. [Текст]. – Введ. 01–07–2015. – К. : Мінекономрозвитку України, 2015. 8. The Handbook of Applied Cryptography, by A. Menezes, P. Van Oorschot, and S. Vanstone, CRC Press, 1996.

Cryptographic Systems and Protocols

Major: Cybersecurity
Code of subject: 6.125.00.O.076
Credits: 5.00
Department: Information Technology Security
Lecturer: D.Sc., prof. Ihor M. Zhuravel
Semester: 6 семестр
Mode of study: денна
Learning outcomes: ЗН 6. Critically comprehend the basic theories, principles, methods and concepts in teaching and professional activities. ЗН 57. Possession of methods of general scientific analysis in the field of information technology and information security; ЗН 63. Knowledge of mathematical models of tasks of information security and information protection. ЗН 64. Knowledge of basic approaches to the organization of standard complexes and means of information protection in information and communication systems.
Required prior and related subjects: prerequisites: • Information theory and coding; • Methods and tools for cryptanalysis; • Monitoring and auditing ICS.
Summary of the subject: Mathematical methods of image structure and cryptographic systems. Ciphers substitution. Pure and mixed codes. Ideal cryptographic system. Key Features protocols. Unidirectional function. Digital signature documents using symmetric and asymmetric systems. Key exchange using symmetric and asymmetric cryptography.
Assessment methods and criteria: • written reports on laboratory work, oral examination, reference work (30%) • final control (70% control measure, exam), written-oral form (70%)
Recommended books: 1. В.Жельников. Криптография от папируса до компьютера. М., "ABF", 1996. 2. Б.Шнайер. Прикладная криптография, 2-е издание: протоколы, алгоритмы, исходные тексты на языке Си. М., Триумф, 2002. 3. М.Вельшенбах. Криптография на Си и С++ в действии. М., Триумф, 2004.

Cryptographic Systems and Protocols (курсовий проєкт)

Major: Cybersecurity
Code of subject: 6.125.00.O.081
Credits: 3.00
Department: Information Security
Lecturer: Ph.D., Associate Professor Horpenyuk A.Y.
Semester: 6 семестр
Mode of study: денна
Learning outcomes: Learning outcomes: LO 6. Critically interpret the main theories, principles, methods and concepts in education and professional activity. Teaching and learning methods: Lectures, classes - informational and perceptive method. Methods of evaluating the achievement of learning outcomes: Current verification in the process of assimilation of each topic being studied; evaluation of the student's activity in the course of lectures; exam - test control and oral survey. LO 15. Knowledge of mathematical models of information security and information protection tasks. LO 19. Knowledge of mathematical models of information security and information protection tasks. Teaching and learning methods: Lecture classes – informational and perceptive method. Practical classes and laboratory works - reproductive method, heuristic method, Independent work - research method. Methods of evaluating the achievement of learning outcomes: Current verification in the process of assimilation of each topic being studied; evaluation of the student's activity in the process of practical classes; checking the performance of laboratory work; verification of practical works; verification of performance of control work; an oral survey on the assimilation of knowledge acquired in the process of performing laboratory work. LO 20. Knowledge of basic approaches to the organization of typical complexes and means of information protection in information and communication systems. Teaching and learning methods: Lectures – information-perceptive method, method of problem presentation. Methods of evaluating the achievement of learning outcomes: Current verification in the process of assimilation of each topic being studied; evaluation of the student's activity in the process of practical classes; checking the performance of laboratory work; verification of practical works; verification of performance of control work; an oral survey on the assimilation of knowledge acquired in the process of performing laboratory work.
Required prior and related subjects: • Discrete Math, • Circuitry, • Complex information protection systems, • Hardware cryptography.
Summary of the subject: This discipline provides students with the necessary knowledge and practical skills needed for effective analysis and design of cryptographic means of cyber security. Methods and means of designing the main elements of modern symmetric and asymmetric cryptosystems, tools and means of cryptographic protocols are studied.
Assessment methods and criteria: • verification of course design tasks (50%); • defense of the course project (50%).
Recommended books: 1. Горпенюк А.Я. Електронний навчально-методичний комплекс «Криптографічні системи та протоколи» у Віртуальному середовищі Львівської політехніки. 2. Бобало Ю.Я. Інформаційна безпека: навч. посібник / Ю.Я.Бобало, І.В.Горбатий, М.Д.Кіселичник, А.П.Бондарєв, С.С.Войтусік, А.Я.Горпенюк, О.А.Нємкова, І.М.Журавель, Б.М.Березюк, Є.І.Яковенко, В.І.Отенко, І.Я.Тишик; за заг. ред. д-ра. техн. наук, проф. Ю.Я.Бобала та д-ра техн. наук, доц. І.В.Горбатого. – Львів: Видавництво Львівської політехніки, 2019. – 580 с. 35,9 обл.-вид. арк. Рекомендований Науково-методичною радою Національного університету “Львівська політехніка” 3. О.В.Вербіцький. Вступ до криптології. Львів., "ВНТЛ", 1998. 4. Гулак Г.Н., Мухачев В.А., Хорошко В.А. Основи криптографічного захисту інформації. – К.: Вид. ДУІКТ, 2009. – 228 с.: іл. 5. Кузнецов Г.В., Фомичов В.В., Сушко С.О., Фомичова Л.Я. Математичні основи криптографії: Навч. Посібник/ Дніпропетровськ: Національний гірничий університет, 2004. – Ч.1. – 391с. 6. Симетричний блоковий шифр "Калина” – новий національний стандарт України / І. Д. Горбенко, Р. В. Олійников, О. В. Казимиров, В. І. Руженцев, О. О. Кузнєцов, Ю. І. Горбенко, О. В. Дирда, В. І. Долгов, А. І. Пушкарьов, Р. І. Мордвінов // Радиотехника. - 2015. - Вып. 181. - С. 5-22. 7. ДСТУ 7624:2014. Інформаційні технології. Криптографічний захист інформації. Алгоритм симетричного блокового перетворення. [Текст]. – Введ. 01–07–2015. – К. : Мінекономрозвитку України, 2015. 8. The Handbook of Applied Cryptography, by A. Menezes, P. Van Oorschot, and S. Vanstone, CRC Press, 1996.

Cryptographic Systems and Protocols (курсовий проєкт)

Major: Cybersecurity
Code of subject: 6.125.00.O.080
Credits: 3.00
Department: Information Technology Security
Lecturer: D.Sc., prof. Ihor M. Zhuravel
Semester: 6 семестр
Mode of study: денна
Learning outcomes: ЗН 6. Critically comprehend the basic theories, principles, methods and concepts in teaching and professional activities. ЗН 57. Possession of methods of general scientific analysis in the field of information technology and information security; ЗН 63. Knowledge of mathematical models of tasks of information security and information protection. ЗН 64. Knowledge of basic approaches to the organization of standard complexes and means of information protection in information and communication systems.
Required prior and related subjects: prerequisites: • Information theory and coding; • Methods and tools for cryptanalysis; • Monitoring and auditing ICS.
Summary of the subject: Mathematical methods of image structure and cryptographic systems. Ciphers substitution. Pure and mixed codes. Ideal cryptographic system. Key Features protocols. Unidirectional function. Digital signature documents using symmetric and asymmetric systems. Key exchange using symmetric and asymmetric cryptography.
Assessment methods and criteria: • written reports on laboratory work, oral examination, reference work (30%) • final control (70% control measure, exam), written-oral form (70%)
Recommended books: 1. В.Жельников. Криптография от папируса до компьютера. М., "ABF", 1996. 2. Б.Шнайер. Прикладная криптография, 2-е издание: протоколы, алгоритмы, исходные тексты на языке Си. М., Триумф, 2002. 3. М.Вельшенбах. Криптография на Си и С++ в действии. М., Триумф, 2004.