+7 (727) 292-54-80    |    г.Алматы, ул.Байтурсынулы, 126/1 корпус А-325

KZ / RU / EN

Курс "Cryptographic methods of information protection"

1.1

.Cryptographic methods of information protection

 

Dates of the event - by agreement

Section names

Watch

Total

Lectures

Practically

1

Introduction. Attacked network components. Servers. Workstations. The medium of information transmission. Network switching nodes. Levels of network attacks according to the OSI model. Software and information security. Information protection and unauthorized access to the Internet

6

4

2

2

The main goals and objectives of ensuring security in telecommunications systems and networks. Classification of threats by the direction of implementation. Information security tools. Possible consequences of attacks on information and information security models

6

4

2

3

Features of the use of cryptographic methods. Classification of cryptoalgorithms. The basic classification scheme for all crypto algorithms. Types of encryption. Classic encryption technique. Perfect and imperfect ciphers. Vernam's scheme

6

4

2

4

Symmetric encryption systems. The general scheme of a symmetric cryptosystem is ciphers of permutation, simple and complex substitution. Encryption by the gamming method.

6

4

2

5

Encryption using a pseudorandom value sensor. American (DES). Russian GOST 28147-89*. Stream and block ciphers.

6

4

2

6

Public-key encryption systems. Classification of methods. The concept of a one-way function. Elements of number theory. Fermat's and Euler's theorems. Advanced Euclid algorithm

6

4

2

7

The main goals and objectives of ensuring security in telecommunications systems and networks. Classification of threats by the direction of implementation. Information security tools. Possible consequences of attacks on information and information security models

6

4

2

8

Symmetric encryption systems. The general scheme of a symmetric cryptosystem is ciphers of permutation, simple and complex substitution. Encryption by the gamming method.

6

4

2

9

Cryptographic Key Management

 

Key distribution using the key distribution center. Direct key exchange between users. Diffie-Hellman key exchange

6

4

2

10

The main goals and objectives of ensuring security in telecommunications systems and networks. Classification of threats by the direction of implementation. Information security tools. Possible consequences of attacks on information and information security models

6

4

2

11

Features of the use of cryptographic methods. Classification of cryptoalgorithms. The basic classification scheme for all crypto algorithms. Types of encryption. Classic encryption technique. Perfect and imperfect ciphers. Vernam's scheme

6

4

2

12

The main goals and objectives of ensuring security in telecommunications systems and networks. Classification of threats by the direction of implementation. Information security tools. Possible consequences of attacks on information and information security models

6

4

2

 

TOTAL

72

48

24

Оцените, пожалуйста, курс!

Преподаватели курса


Фотографии с занятий


Есть вопросы о курсе? Задайте их в этой форме!









ЗАЯВКА НА КУРС

Пожалуйста, оставьте свои данные, мы вам обязательно перезвоним!


Количество слушателей