×

Faculty of Technical Sciences

Subject: Advanced cryptographic algorithms (17.ESI096)

General information:
 
Category Theoretical-methodological
Scientific or art field Primenjeno softversko inženjerstvo
ECTS 6

Acquiring advanced knowledge about threats and security controls used for protecting infrastructure systems. Familiarize with the latest trends and threats in both the physical and digital domains. Develop solutions for authentication and access control. Learn the basics of secure software development. Solve specific security problems in the domain of infrastructure systems.

Familiarity with the history of critical infrastructure protection, as well as with the most frequent security issues in those systems. Capability to implement the necessary security controls in the physical and electronic domains. Capability to distinguish the various threats in cyberspace. Acquired the skills to develop authentication and access control. Capability to analyze different threats and develop secure code.

Introduction and history of information security in infrastructure systems. Physical security. Personnel secuirty and social engineering. Introduction to cryptographic algorithms and standards. Symmetric algorithms. Asymmetric algorithms. One-way functions. Homomorphic algorithms. Commparable analysis of the presented algorithms. Handling secret keys. Digital signatures. Basics of quantum cryptography. Identification, authentication and access control. Secure communication systems. Malware. Introduction to threat modeling and secure software development. Privacy and legal aspects in information security.

Lectures; Laboratory exercises; Consultations.

Authors Title Year Publisher Language
Pfleeger C. & Pfleeger S.L. Security in Computing 2015 Prentice Hall English
Ransome, J., Misra, A. Core Software Security : Security at the Source 2013 Auerbach Publications English
Fisher, R.P. Information systems security 1984 Prentice-Hall, Englewood Cliffs English
John F. Dooley History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms (History of Computing) 2018 Springer English
Knapp, E.D., Langill, J.T. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems 2015 Elsevier English
Swarup Bhunia, Mark Tehranipoor Hardware Security: A Hands-on Learning Approach 2017 Springer English
Scott Donaldson, Stanley Siegel, Chris K. Williams, Abdul Aslam Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats 2015 Apress English
Course activity Pre-examination Obligations Number of points
Computer exercise attendance Yes Yes 5.00
Lecture attendance Yes Yes 5.00
Theoretical part of the exam No Yes 20.00
Computer excersise defence Yes Yes 25.00
Written part of the exam - tasks and theory No Yes 20.00
Computer excersise defence Yes Yes 25.00

Prof. Aleksandar Erdeljan

Full Professor

Lectures

API Image

Prof. Darko Čapko

Full Professor

Lectures

Assistant - Master Mirko Mikać

Assistant - Master

Computational classes

Assistant - Master Slađana Turudić

Assistant - Master

Computational classes

Assistant - Master Zoran Pajić

Assistant - Master

Computational classes

Assistant - Master Simona Prokić

Assistant - Master

Computational classes

Faculty of Technical Sciences

© 2024. Faculty of Technical Sciences.

Contact:

Address: Trg Dositeja Obradovića 6, 21102 Novi Sad

Phone:  (+381) 21 450 810
(+381) 21 6350 413

Fax : (+381) 21 458 133
Emejl: ftndean@uns.ac.rs

© 2024. Faculty of Technical Sciences.