Tempus – DEUKS Doctoral School towards European Knowledge Society Mathematical Institute Serbian Academy of Sciences and Arts Belgrade Udine, May 6-9,

Slides:



Advertisements
Similar presentations
Computer Science Department
Advertisements

1 Lect. 3 : Basic Terms Lots of new terminologies in every new fields…
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
TEMPUS ME-TEMPUS-JPHES “IMPROVEMENT OF PARTNERSHIP WITH ENTERPISES BY ENHENCEMENT OF A REGIONAL QUALITY MANAGEMENT POTENTIALS IN WBC” TEMPUS
Information Security Teaching, training, research.
Joint programmes in Croatia: First Experiences of the University of Zagreb Aleksa Bjeliš Second Meeting of UNICA Bologna Lab Coordinators - University.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
New Strategy and Teacher Training toward 21 st century Hiroyuki Kuno, PhD Aichi University of Education, Japan NIS International.
Information Security Principles (ESGD4222)
1 Lesson Internet Organization network Fire wall.
1 Mathematical Institute Serbian Academy of Sciences and Arts, Belgrade DEUKS Meeting Valencia, September 9-11, 2008, Valencia New PhD modules proposal.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
October 17, 2011 Innovation strategy and its implementation in the Czech Republic.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
CRYPTOGRAPHY How does it impact cyber security and why you need to know more?
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Dr. Nazar Abbas Saqib.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
March 4, 2004 Cryptography and Computer Security for Undergraduates Suzanne E. Gladfelter Penn State York
Modern Cryptographic Topics
Chapter 7: Cryptographic Systems
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Lecture 2: Introduction to Cryptography
Advanced cryptography and application Nguyen Dinh Thuc University of Science, HCMC
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Cryptology aka Cryptography Tim Cahill Ryan Church.
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science/
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
Tempus JEP_41099_2006 Silvia Ghilezan Project coordinator Faculty of Technical Sciences University Novi Sad Doctoral School towards European Knowledge.
Computer Security (CS4800)
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Автоматизация деятельности библиотек на основе радиочастотной идентификации Качина Наталия Ивановна Директор Департамента по работе с библиотеками и вузами.
Introduction to Information Security Introduction & Overview
사물네트워크 시스템 보안 - Focused on Advanced Cryptography-
Cryptography And Network Security
EWME 2008, Budapest, Hungary, 30 May 2008
Chapter 3:Cryptography (16M)
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Cybersecurity and Data Encryption
Cryptology.
Computer Security Chapter Two
HMAC and its Design Objectives
Digital Signature Standard (DSS)
Presentation transcript:

Tempus – DEUKS Doctoral School towards European Knowledge Society Mathematical Institute Serbian Academy of Sciences and Arts Belgrade Udine, May 6-9, 2008

I. A Brief Summary on Cryptology and Information Security Issues In the Mathematical Institute

Mathematical Institute mission Top level research and education activities in a large number of directions within mathematics and its applications Particularly, Information Technologies (IT) area is well recognized as an important area for stimulating not only “applied” mathematics but the “basic” one as well.

Cryptology and Information Security in Mathematical Institute Cryptology Fundamental research projects Support of PhD studies via the scientific projects High Level Seminars International Collaboration Information Security Research and development projects International collaboration

II. Motivation for the Proposed Lectures on Cryptology and Information Security

Why and References Worldwide recognized need and significance for the top level education on information security and its background - cryptology Experience of MI- SANU regarding: (i)Scientific/Research Projects on Cryptology and Information Security (ii)Technological Projects (including FP6 ones) and a lot of ad-hock national consulting projects

III. Lectures on Cryptology and Information Security Yielding the General Knowledge and the Background for the Ph.D. Research Activities

Two (Main) Courses “Fundamentals of Cryptology” Goals: (i)To provide general knowledge on the basis of information security (ii)To provide a background for involvement into research projects in cryptology “Selected Topics in Information Security” Goals: (i)To yield general knowledge on information security management systems and applications of cryptology (ii)To provide a background for involvement into information security related projects

“Fundamentals of Cryptology” Cryptography (i) Secret Key Cryptography (ii) Public Key Cryptography Cryptographic Hashing & Integrity Control Authentication & Digital Signatures Cryptanalysis and Security Evaluation including: Cryptanalysis of encryption methods & techniques Cryptanalysis of hash functions Cryptanalysis of authentication techniques

“Selected Topics of Information Security” Mandatory topics for all the students including: (i)Data Access Control (ii)Wireless Security including Radio Frequency Identification (RFID) and Sensor Networks Security (iii)Information Security Management Systems (ISMS) “Customized topics” to the particular interest of a student (a number of topics selected from a list of the available topics)