Methods and Techniques of Cryptoanalysis

Major: Cybersecurity
Code of subject: 6.125.01.E.124
Credits: 4.00
Department: Information Technology Security
Lecturer: M.Rusinko Ph.D., Associate Professor
Semester: 8 семестр
Mode of study: денна
Learning outcomes: 1. know the channels of vulnerability and leakage of information, the phenomena inherent in their manifestation and existence; 2. know and be able to apply in practice the basic methods, mechanisms, protocols and algorithms of cryptanalysis; 3. know and be able to apply in practice the criteria and indicators for assessing the quality of cryptanalysis; 4. know and be able to apply in practice methods and means of analysis and crypto analysis of asymmetric and symmetric crypto transformations; 5. know and be able to apply in practice the methods, mechanisms and protocols of secure installation, coordination, confirmation, distribution and transportation of keys and distribution of secrets; 6. The main contradictions, problems, trends and directions of development of the theory and practice of cryptographic protection of information, forecasting their capabilities and capabilities of violators (crypto analysts).
Required prior and related subjects: Algorithmic bases of cryptology Applied cryptography Cryptographic systems and protocols
Summary of the subject: Classification and consideration of the main attacks on symmetric and asymmetric cryptocurrencies, their comparative analysis according to the relevant criteria and indicators of stability, forecasting the development of methods and systems of cryptanalysis, assessment of real cryptocurrency and development of sound recommendations.
Assessment methods and criteria: The form of final control over the discipline "Methods and means of cryptanalysis" - exam. Forms of current control during training sessions: - survey during laboratory work; - survey during practical classes; - laboratory work; -practical training.
Recommended books: Gorbenko I., Gorbenko Y. Applied cryptology: Theory. Practice. Application: Textbook for higher education institutions. - Kharkiv: Fort Publishing House, - 880 p. Schneier B. Applied cryptography. Protocols, algorithms, source texts in SI language. - M .: "Triumph", 2002. - 797 p.