Applied Сryptography (курсова робота)

Major: Cybersecurity
Code of subject: 6.125.01.E.119
Credits: 2.00
Department: Information Technology Security
Lecturer: assistant professor Voytusik Stepan
Semester: 7 семестр
Mode of study: денна
Learning outcomes: ZN 3. Use the results of independent search, analysis and synthesis of information from various sources to effectively solve specialized problems of professional activity. ZN 4. Analyze, argue, make decisions in solving complex specialized problems and practical problems in professional activities, which are characterized by complexity and incomplete definition of conditions, be responsible for the decisions made. ZN 6. Critically comprehend the basic theories, principles, methods and concepts in teaching and professional activities. ZN 7. To act on the basis of the legislative and regulatory framework of Ukraine and the requirements of relevant standards, including international ones in the field of information and / or cybersecurity. ZN 13. Knowledge of modern achievements of innovative technologies in the field of information technologies, cybersecurity and management; ZN 14. Knowledge and understanding of scientific principles underlying cybersecurity and information technology; ZN 15. Possession of methods of general scientific analysis in the field of information technology and information security; ZN 1.4. Apply theories and methods of protection to ensure the security of information in information and telecommunications systems. ZN 1.6. Solve problems of protection of information processed in information and telecommunication systems using modern methods and means of cryptographic protection of information.
Required prior and related subjects: • Probability theory. • Basics of discrete mathematics. • Cryptographic systems and protocols. • Applied cryptology.
Summary of the subject: Course work is the design of symmetric and asymmetric ciphers, analyzing their sustainability. The objective of the course is to develop a symmetric block cipher algorithm based on Feistel cipher or permutation substitution structures, their modeling and analysis by Cryptol. Also considered as tasks implement asymmetric system.
Assessment methods and criteria: • Written examination. • Oral examination in the form of an interview. Evaluation of the course project is carried out on a 100-point scale, which consists of two parts: 1) implementation of a course project (analytical, technical parts, graphic part - 60 points) and 2) project defence (presentation, answers to the question - 40 points).
Recommended books: 1. Горбенко І.Д., Горбенко Ю.І. Прикладна криптологія. Підручник. – Х.: ХНУРЕ, Форт, 2013. - 878 с. 2. Шнайер Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си = Applied Cryptography. Protocols, Algorithms and Source Code in C. — М.: Триумф, 2002. — 816 с.с. 3. Горбенко Ю.І., Горбенко І.Д. Інфраструктури відкритих ключів. Системи ЕЦП. Теорія та практика. - Х.: Форт, 2010. – 593 с. 4. http://cryptol.net/files/ProgrammingCryptol.pdf Cryptol: The Language of Cryptography. Galois, Inc

Applied Сryptography

Major: Cybersecurity
Code of subject: 6.125.01.E.117
Credits: 4.00
Department: Information Technology Security
Lecturer: assistant professor Voytusik Stepan
Semester: 7 семестр
Mode of study: денна
Learning outcomes: ZN 7. To act on the basis of the legislative and regulatory framework of Ukraine and the requirements of relevant standards, including international ones in the field of information and / or cybersecurity. ZN 9. Implement processes based on national and international standards, identification, analysis and response to information and / or cybersecurity incidents. ZN 10. Use modern software and hardware and evaluate the effectiveness of the quality of decisions. ZN 14. Knowledge and understanding of scientific principles underlying cybersecurity and information technology. ZN 20. Knowledge of basic approaches to the organization of standard complexes and means of information protection in information and communication systems. ZN 21. Knowledge of new domestic and international standards of information security. ZN 1.4. Apply theories and methods of protection to ensure the security of information in information and telecommunications systems. ZN 1.6. Solve problems of protection of information processed in information and telecommunication systems using modern methods and means of cryptographic protection of information. ZN 1.9. Ensure the functioning of software and software and hardware systems for detecting intrusions of different levels and classes (statistical, signature, statistical-signature).
Required prior and related subjects: • Probability theory. • Basics of discrete mathematics. • Cryptographic systems and protocols.
Summary of the subject: Basic theory of secret systems. Symmetric cryptographic transformations and their properties. Sources of keys and key information requirements. General characteristics and comparative analysis of block and stream cipher. Stream ciphers: A5, Salsa20, Chacha. Modern symmetric encryption block algorithms. Ciphers Feystel, algorithms DES, 3DES, GOST 28147-89. Algorithm 'Kalina'. The concept of public key. Diffie-Hellman protocol. The distribution key in asymmetric cryptosystems. One-way function as the basis of asymmetric cryptosystems. Asymmetric cryptosystems Rabin and RSA, basic algorithms and tools for their implementation. The basic mathematical principles and principles of cryptographic systems based on elliptic curves. Ukrainian standard DSTU 4145-2002.
Assessment methods and criteria: • written reports on laboratory work, oral examination, reference work (30%); • final control (70% control measure, test), writing, oral form (70%).
Recommended books: 1. Горбенко І.Д., Горбенко Ю.І. Прикладна криптологія. Підручник. – Х.: ХНУРЕ, Форт, 2013. - 878 с. 2. Шнайер Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си = Applied Cryptography. Protocols, Algorithms and Source Code in C. — М.: Триумф, 2002. — 816 с.с. 3. Горбенко Ю.І., Горбенко І.Д. Інфраструктури відкритих ключів. Системи ЕЦП. Теорія та практика. - Х.: Форт, 2010. – 593 с.