Information Security in Telecommunication Systems

Major: Telecommunications and Radio Engineering
Code of subject: 6.172.02.E.066
Credits: 4.00
Department: Telecommunication
Lecturer: PhD, Assoc.Prof Burachok Roman
Semester: 7 семестр
Mode of study: денна
Мета вивчення дисципліни: To prepare students for production, organizational, managerial, project and research activities in the field of cryptographic protection of information in telecommunication systems and networks.
Завдання: The study of an educational discipline involves the formation of competencies in students of education: general competences: ZK-1. Ability to abstract thinking, analysis and synthesis. ZK-2. Ability to apply knowledge in practical situations. ZK-4. Knowledge and understanding of the subject area and understanding of professional activity. ZK-7. Ability to learn and master modern knowledge. ZK-8. Ability to identify, pose and solve problems. ZK-13. Ability to system thinking. ZK-14. Ability to search and analyze information from various sources. ZK-15. Knowledge of another language(s); professional competences: FC-1. The ability to understand the essence and meaning of information in the development of a modern information society. FC-2. The ability to solve standard tasks of professional activity on the basis of information and bibliographic culture with the use of information and communication technologies and taking into account the basic requirements of information security. FC-3. Ability to use basic methods, methods and means of obtaining, transmitting, processing and storing information. FK-4. Ability to perform computer modeling of devices, systems and processes using universal application program packages. FC-5. Ability to use regulatory and legal documentation related to information and telecommunication networks, telecommunication and radio technical systems (laws of Ukraine, technical regulations, international and national standards, recommendations of the International Telecommunication Union, etc.) to solve professional tasks.
Learning outcomes: - Be able to organize theoretical knowledge to work with the data protection system; - Know the mathematical basis for the formation algorithms data encryption and information protection; - Be able to organize the protection of databases and network transfer of public; - Be able to use the hardware and software cryptographic algorithms for encryption, encryption protocols, methods and tools to protect data from unauthorized access; - Gain skills in operation of cryptographic systems.
Required prior and related subjects: pre-requisites: - Informatics (on a professional basis); - Telecommunication transmission systems; - Telecommunication and information networks; - Switching and distribution systems. co-requisites: - Design of telecommunication systems and networks; - Construction theory and protocols of infocommunication networks; - Systems of information security of telecommunication networks; - System programming of infocommunications.
Summary of the subject: In the discipline attention is paid to the study of a specialized mathematical apparatus used in the field of cryptography. The algorithms, methods and mechanisms of cryptographic protection of information in the process of its transmission and storage in databases are considered. There is an overview of secure transmission protocols and their interactions with other protocols of open telecommunication systems. Student learns to deploy, operate and maintain civil and specialized information security systems.
Опис: 1. Legislation in the field of cryptography in Ukraine and internationally. Concept and definition of cryptographic data protection and cryptanalytic attacks. Basic approaches in information protection and its decryption. 2. Key selection. Hardware and software means of information protection. Service services. Defense mechanisms. Violations: passive and active. Confidentiality, authentication, integrity, non-repudiation, availability, access control. Network protection model. 3. Classical methods of information protection. Caesar's algorithms, pairs, picket fences, drum machines, pair ciphers, disposable notebook. Decryption of information: by the method of branching attack, Chinese lottery, frequency analysis. 4. Symmetric encryption algorithms. Simplified DES. Principles of block encryption. The concept of confusion and diffusion. Standard DES. DES structure and tables. Reliability of DES. Differential and linear cryptanalysis. DES operating modes. Double and triple DES. 5. IDEA encryption algorithm. Structure, calculation of subkeys, decryption. Characteristics of IDEA. Placement of encryption functions. Confidential data transfer. 6. Distribution of keys. Generating random numbers. Using DES to generate random numbers. 7. Asymmetric encryption algorithms. Principles of building cryptosystems with a public key, RSA algorithm. Key management. Key exchange according to the Diffie-Hellman scheme. 8. Cryptography using elliptic curves. Authentication requirements and functions. Message authenticity codes. Hashing functions. Protection of hashing functions. 9. Algorithms for calculating the message profile. Secure hashing algorithm. Digital signatures and authentication protocols. Digital signatures. Authentication protocols. Digital signature standards. Mutual and one-way authentication. Arbitration digital signature. 10. Network protection of information. Authentication applications. Authentication services. Email protection. PGP. IR protection. Analysis of protection possibilities at the IR level. 11. Protection architecture at the IP level. Authentication Header and Secured Payload. A combination of protective ties. Key management. WEB protection. Issues of protection. Protection protocols at the WEB level. 12. Protocol of secure electronic transactions. Protection of systems. Violators and viruses. Password protection. Invasion technique. The nature of viruses. Macroviruses. Antivirus protection. Use of firewalls. Principles of firewall development. Designing a highly reliable system.
Assessment methods and criteria: Written reports on laboratory practicals, oral examination (30%); Term assessment (70% , exam): - written form (50%); - oral form (20%).
Критерії оцінювання результатів навчання: Current control (СC): performance and defense of laboratory work - 30 points. Examination control (EC): written component - 50 points, oral component - 20 points. The total number of points for SC: SС= EC+СC = 70+30 = 100 points. Exam: is assessed by written and oral components (the exam ticket contains questions of three difficulty levels, the maximum number of points is 70); current control: the total number of points for the performance of laboratory work (completed laboratory reports are submitted in writing and defended orally, the maximum number of points is 30).
Порядок та критерії виставляння балів та оцінок: 100–88 points – (“excellent”) is awarded for a high level of knowledge (some inaccuracies are allowed) of the educational material of the component contained in the main and additional recommended literary sources, the ability to analyze the phenomena being studied in their interrelationship and development, clearly, succinctly, logically, consistently answer the questions, the ability to apply theoretical provisions when solving practical problems; 87–71 points – (“good”) is awarded for a generally correct understanding of the educational material of the component, including calculations, reasoned answers to the questions posed, which, however, contain certain (insignificant) shortcomings, for the ability to apply theoretical provisions when solving practical tasks; 70 – 50 points – (“satisfactory”) awarded for weak knowledge of the component’s educational material, inaccurate or poorly reasoned answers, with a violation of the sequence of presentation, for weak application of theoretical provisions when solving practical problems; 49-26 points - ("not certified" with the possibility of retaking the semester control) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to apply theoretical provisions when solving practical problems; 25-00 points - ("unsatisfactory" with mandatory re-study) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to navigate when solving practical problems, ignorance of the main fundamental provisions.
Recommended books: - CompTIA Security+ All-in-One Exam Guide / Wm. Arthur Conklin, G. White, D. Williams, Ch. Cothren, R. Davis. – McGraw-Hill Education, 2015. - An Introduction to Mathematical Cryptography / J. Hoffstein, J. Pipher, J.H. Silverman. – Springer. – 2008. - Understanding Cryptography: A Textbook For Students And Practitioners / Ch. Paar, J. Pelzl. - Springer. – 2011. - Столлингс Вильям. Криптография и защита сетей: принципы и практика, 2-е изд.: Пер. с англ. – М.: Издательский дом “Вильямс”, 2001. - Анин Б. Ю. Защита компьютерной информации. – СПб.: БХВ-Петербург, 2000. - Гундарь К.Ю., Гундарь А.Ю., Янишевский Д.А. Защита информации в компьютерных системах. – К. : Издательство «Корнійчук», 2000. - Домарев В.В. Защита информации и безопасность компьютерных систем. – К. Издательство «Диасофт», 1999. - Вербіцький О.В. Вступ до криптології. - Видавництво наук.-техн. літератури. – Львів, 1998. http://www.intuit.ru/studies/courses/13845/1242/info http://www.intuit.ru/studies/courses/102/102/info http://www.intuit.ru/studies/courses/28/28/info http://www.intuit.ru/studies/courses/552/408/info http://www.intuit.ru/studies/courses/697/553/info http://www.intuit.ru/studies/courses/553/409/info http://www.intuit.ru/studies/courses/10/10/info http://www.intuit.ru/studies/courses/691/547/info http://www.intuit.ru/studies/courses/59/59/info http://www.intuit.ru/studies/courses/30/30/info http://www.intuit.ru/studies/courses/16655/1300/info
Уніфікований додаток: Lviv Polytechnic National University ensures the realization of the right of persons with disabilities to obtain higher education. Inclusive educational services are provided by the Service of accessibility to learning opportunities "Without restrictions", the purpose of which is to provide permanent individual support for the educational process of students with disabilities and chronic diseases. An important tool for the implementation of the inclusive educational policy at the University is the Program for improving the qualifications of scientific and pedagogical workers and educational and support staff in the field of social inclusion and inclusive education. Contact at: St. Karpinsky, 2/4, 1st floor, room 112 E-mail: nolimits@lpnu.ua Websites: https://lpnu.ua/nolimits https://lpnu.ua/integration
Академічна доброчесність: The policy regarding the academic integrity of the participants of the educational process is formed on the basis of compliance with the principles of academic integrity, taking into account the norms "Regulations on academic integrity at the Lviv Polytechnic National University" (approved by the academic council of the university on June 20, 2017, protocol No. 35).