Курс "Защита информации", кафедра радиотехники, Московский физико-технический институт (МФТИ)

2010: Главная Экзамен Лекции Семинары Проекты Эссе | Преподаватели Литература | Архив: 2009 2008-fall 2008 2007 2006 2005 2004 2003 | English

Classes, Fall 2008

  1. Introduction. Monoalphabetic ciphers. Polyalphabetic ciphers.
  2. Block ciphers. GOST.
  3. Block ciphers. AES. Operation modes.
  4. Number theory.
  5. Public-key cryptosystems (RSA, ElGamal). Signatures. Hashs. MACs.
  6. Elliptic Curves.
  7. User authentication. Key management on symmetric schemes. Kerberos.
  8. User authentication. Key management on asymmetric schemes. Certificates. PKI. X509.3. PGP.
  9. Encrypted channels. SSL/TLS. SSH.
  10. Encrypted channels. IPSec.
  11. Software vulnerabilities. Buffer overflow. Viruses.
  12. Mobile networks (GSM, CDMA). Wireless networks.
  13. Group projects.
  14. Group projects.
  1. Introduction. Monoalphabetic ciphers. Polyalphabetic ciphers.

  2. Block ciphers. DES. GOST.

  3. Block ciphers. AES. Operation modes.

  4. Number theory.

  5. Public-key cryptosystems (RSA, ElGamal). Signatures. Hashs. MACs.

  6. Elliptic curves.

  7. User authentication. Key management on symmetric schemes. Kerberos.

  8. User authentication. Key management on asymmetric schemes. Certificates. PKI. X509.3. PGP.

  9. Encrypted channels. SSL/TLS. SSH.

  10. Encrypted channels. IPSec.

  11. Software vulnerabilities. Buffer overflow. Viruses.

  12. Mobile networks (GSM, CDMA). Wireless networks.

  13. Group projects.

  14. Group projects.


Page last update: Mon Feb 15 16:14:17 2010 MSK.
Website last update:
Rambler's Top100 Рейтинг@Mail.ru