PV204 Laboratory of security and applied cryptography II

Faculty of Informatics
Spring 2010
Extent and Intensity
0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: z (credit). Other types of completion: k (colloquium).
Teacher(s)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
RNDr. Marek Kumpošt, Ph.D. (seminar tutor)
RNDr. Václav Lorenc (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
RNDr. Roman Žilka (seminar tutor)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Timetable
Wed 8:00–9:50 4.130a, Wed 10:00–11:50 4.130a
  • Timetable of Seminar Groups:
PV204/01: No timetable has been entered into IS. J. Krhovják, M. Kumpošt, V. Lorenc, V. Matyáš, Z. Říha, P. Švenda, P. Tuček
PV204/02: No timetable has been entered into IS. J. Krhovják, M. Kumpošt, V. Lorenc, V. Matyáš, Z. Říha, P. Švenda, P. Tuček
Prerequisites
Registration to PV204 requires: 1) ability to work independently; 2) long-term interest in IT security (having done another IT security and/or cryptology courses and description of your interest in 3-10 sentences); 3) programming skills (ideally C and Java) under Unix/Linux or Win32; 4) fluent English; 5) team work ability.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 36 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of biometric authentication systems and be able to apply the gained knowledge in practice. At the end of the course students also will be able to understand the principles of network security and identify weak points in networks.
Syllabus
  • Biometric systems (error rates, keyboard typing, voice verification, face recognition, fingerprints and their security, calculation of error rates). Network security (eavesdropping, security of active network entities, IDS systems, vulnerability scanning, wireless networks). Security of operating systems (Windows, Linux, rootkits, viruses, web applications).
Literature
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
Teaching methods
seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 14 homeworks (10 points each). To get the credit (Z) 50% of the points are required.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.
  • Enrolment Statistics (Spring 2010, recent)
  • Permalink: https://is.muni.cz/course/fi/spring2010/PV204