Faculty of Technical Sciences

Subject: Advanced cryptographic algorithms (17.ESI096)

General information:
 
Category Theoretical-methodological
Scientific or art field Primenjeno softversko inženjerstvo
ECTS 6

Acquiring advanced knowledge about threats and security controls used for protecting infrastructure systems. Familiarize with the latest trends and threats in both the physical and digital domains. Develop solutions for authentication and access control. Learn the basics of secure software development. Solve specific security problems in the domain of infrastructure systems.

Familiarity with the history of critical infrastructure protection, as well as with the most frequent security issues in those systems. Capability to implement the necessary security controls in the physical and electronic domains. Capability to distinguish the various threats in cyberspace. Acquired the skills to develop authentication and access control. Capability to analyze different threats and develop secure code.

Introduction and history of information security in infrastructure systems. Physical security. Personnel secuirty and social engineering. Introduction to cryptographic algorithms and standards. Symmetric algorithms. Asymmetric algorithms. One-way functions. Homomorphic algorithms. Commparable analysis of the presented algorithms. Handling secret keys. Digital signatures. Basics of quantum cryptography. Identification, authentication and access control. Secure communication systems. Malware. Introduction to threat modeling and secure software development. Privacy and legal aspects in information security.

Lectures; Laboratory exercises; Consultations.

Authors Title Year Publisher Language
Swarup Bhunia, Mark Tehranipoor Hardware Security: A Hands-on Learning Approach 2017 Springer English
Fisher, R.P. Information systems security 1984 Prentice-Hall, Englewood Cliffs English
Knapp, E.D., Langill, J.T. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems 2015 Elsevier English
Ransome, J., Misra, A. Core Software Security : Security at the Source 2013 Auerbach Publications English
Scott Donaldson, Stanley Siegel, Chris K. Williams, Abdul Aslam Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats 2015 Apress English
John F. Dooley History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms (History of Computing) 2018 Springer English
Pfleeger C. & Pfleeger S.L. Security in Computing 2015 Prentice Hall English
Course activity Pre-examination Obligations Number of points
Computer excersise defence Yes Yes 25.00
Lecture attendance Yes Yes 5.00
Computer excersise defence Yes Yes 25.00
Written part of the exam - tasks and theory No Yes 20.00
Theoretical part of the exam No Yes 20.00
Computer exercise attendance Yes Yes 5.00

Prof. Erdeljan Aleksandar

Full Professor

Lectures
API Image

Prof. Čapko Darko

Full Professor

Lectures

Assistant - Master Mikać Mirko

Assistant - Master

Computational classes

Assistant - Master Turudić Slađana

Assistant - Master

Computational classes

Assistant - Master Pajić Zoran

Assistant - Master

Computational classes

Assistant - Master Prokić Simona

Assistant - Master

Computational classes

Faculty of Technical Sciences

© 2024. Faculty of Technical Sciences.

Contact:

Address: Trg Dositeja Obradovića 6, 21102 Novi Sad

Phone:  (+381) 21 450 810
(+381) 21 6350 413

Fax : (+381) 21 458 133
Emejl: ftndean@uns.ac.rs

© 2024. Faculty of Technical Sciences.