Ви переглядаєте архівну версію офіційного сайту НУЛП (2005-2020р.р.). Актуальна версія: https://lpnu.ua

Applied Сryptography (курсова робота)

Major: Cyber Security
Code of Subject: 6.125.01.E.147
Credits: 2
Department: Information Technology Security
Lecturer: assistant professor Voytusik Stepan
Semester: 7 семестр
Mode of Study: денна
Learning outcomes:
• Deepening the theoretical knowledge of the subject "Applied cryptology."
• Knowledge of design techniques of symmetric and asymmetric ciphers.
• Acquisition of experience in designing symmetric block algorithms with the help of subject programming language Cryptol.
Required prior and related subjects:
• Probability theory.
• Basics of discrete mathematics.
• Cryptographic systems and protocols.
• Applied cryptology.
Summary of the subject:
Course work is the design of symmetric and asymmetric ciphers, analyzing their sustainability. The objective of the course is to develop a symmetric block cipher algorithm based on Feistel cipher or permutation substitution structures, their modeling and analysis by Cryptol. Also considered as tasks implement asymmetric system.
Recommended Books:
1. Горбенко І.Д., Горбенко Ю.І. Прикладна криптологія. Підручник. – Х.: ХНУРЕ, Форт, 2013. - 878 с.
2. Шнайер Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си = Applied Cryptography. Protocols, Algorithms and Source Code in C. — М.: Триумф, 2002. — 816 с.с.
3. Горбенко Ю.І., Горбенко І.Д. Інфраструктури відкритих ключів. Системи ЕЦП. Теорія та практика. - Х.: Форт, 2010. – 593 с.
4. http://cryptol.net/files/ProgrammingCryptol.pdf Cryptol: The Language of Cryptography. Galois, Inc
Assessment methods and criteria:
• Written examination.
• Oral examination in the form of an interview.
Evaluation of the course project is carried out on a 100-point scale, which consists of two parts: 1) implementation of a course project (analytical, technical parts, graphic part - 60 points) and 2) project defence (presentation, answers to the question - 40 points).

Applied Сryptography

Major: Cyber Security
Code of Subject: 6.125.01.E.146
Credits: 4
Department: Information Technology Security
Lecturer: assistant professor Voytusik Stepan
Semester: 7 семестр
Mode of Study: денна
Learning outcomes:
• know basic methods, tools, protocols, algorithms and standards for cryptographic protection; methods of information cryptographic transformation and ways of their implementation; basic contradictions, challenges, trends and directions of development of the theory and practice of cryptographic protection of information, forecasting their capacities and capabilities offenders (crypto analysts);
• be able to substantiate, select and apply the criteria and indicators for assessing the stability and safety of cryptographic cryptographic protocols; develop requirements and choose to apply cryptographic transformations and protocols that minimize impacts offenders.
Required prior and related subjects:
• Probability theory.
• Basics of discrete mathematics.
• Cryptographic systems and protocols.
Summary of the subject:
Basic theory of secret systems. Symmetric cryptographic transformations and their properties. Sources of keys and key information requirements. General characteristics and comparative analysis of block and stream cipher. Stream ciphers: A5, Salsa20, Chacha. Modern symmetric encryption block algorithms. Ciphers Feystel, algorithms DES, 3DES, GOST 28147-89. Algorithm 'Kalina'. The concept of public key. Diffie-Hellman protocol. The distribution key in asymmetric cryptosystems. One-way function as the basis of asymmetric cryptosystems. Asymmetric cryptosystems Rabin and RSA, basic algorithms and tools for their implementation. The basic mathematical principles and principles of cryptographic systems based on elliptic curves. Ukrainian standard DSTU 4145-2002.
Recommended Books:
1. Горбенко І.Д., Горбенко Ю.І. Прикладна криптологія. Підручник. – Х.: ХНУРЕ, Форт, 2013. - 878 с.
2. Шнайер Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си = Applied Cryptography. Protocols, Algorithms and Source Code in C. — М.: Триумф, 2002. — 816 с.с.
3. Горбенко Ю.І., Горбенко І.Д. Інфраструктури відкритих ключів. Системи ЕЦП. Теорія та практика. - Х.: Форт, 2010. – 593 с.
Assessment methods and criteria:
• written reports on laboratory work, oral examination, reference work (30%);
• final control (70% control measure, test), writing, oral form (70%).