Download presentation
Presentation is loading. Please wait.
Published byDwain Hubbard Modified over 8 years ago
1
Tempus – DEUKS Doctoral School towards European Knowledge Society Mathematical Institute Serbian Academy of Sciences and Arts Belgrade Udine, May 6-9, 2008
2
I. A Brief Summary on Cryptology and Information Security Issues In the Mathematical Institute
3
Mathematical Institute mission Top level research and education activities in a large number of directions within mathematics and its applications Particularly, Information Technologies (IT) area is well recognized as an important area for stimulating not only “applied” mathematics but the “basic” one as well.
4
Cryptology and Information Security in Mathematical Institute Cryptology Fundamental research projects Support of PhD studies via the scientific projects High Level Seminars International Collaboration Information Security Research and development projects International collaboration
5
II. Motivation for the Proposed Lectures on Cryptology and Information Security
6
Why and References Worldwide recognized need and significance for the top level education on information security and its background - cryptology Experience of MI- SANU regarding: (i)Scientific/Research Projects on Cryptology and Information Security (ii)Technological Projects (including FP6 ones) and a lot of ad-hock national consulting projects
7
III. Lectures on Cryptology and Information Security Yielding the General Knowledge and the Background for the Ph.D. Research Activities
8
Two (Main) Courses “Fundamentals of Cryptology” Goals: (i)To provide general knowledge on the basis of information security (ii)To provide a background for involvement into research projects in cryptology “Selected Topics in Information Security” Goals: (i)To yield general knowledge on information security management systems and applications of cryptology (ii)To provide a background for involvement into information security related projects
9
“Fundamentals of Cryptology” Cryptography (i) Secret Key Cryptography (ii) Public Key Cryptography Cryptographic Hashing & Integrity Control Authentication & Digital Signatures Cryptanalysis and Security Evaluation including: Cryptanalysis of encryption methods & techniques Cryptanalysis of hash functions Cryptanalysis of authentication techniques
10
“Selected Topics of Information Security” Mandatory topics for all the students including: (i)Data Access Control (ii)Wireless Security including Radio Frequency Identification (RFID) and Sensor Networks Security (iii)Information Security Management Systems (ISMS) “Customized topics” to the particular interest of a student (a number of topics selected from a list of the available topics)
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.