ITO5163 Information and computer Security TP6-24
Module 1:
- Lesson 1: Introduction to computer security
- Lesson 2: Number theory
- [[Fermat’s little theorem]]
- [[Euler’s totient function and Euler’s theorem]]
- Lesson 3: Mathematical hard problems
Module 2:
- Lesson 4: Introduction to symmetric cryptography
- Lesson 5: Symmetric cryptosystems
Module 3
- Lesson 6: Introduction to asymmetric cryptography
- [[Lesson 6_ Introduction to Asymmetric Cryptography.pdf]]
- Lesson 7: Asymmetric cryptosystems
- [[Lesson 7_ Asymmetric Cryptosystems.pdf]]
- Lesson 8: Advanced asymmetric cryptosystems
- [[Lesson 8_ Advanced Asymmetric Cryptosystems.pdf]]
Module 4
[[Lesson 9_ Authentication.pdf]] [[Lesson 10_ Integrity verification.pdf]] [[Lesson 11_ Methods and Key Establishment Protocols.pdf]]
Module 5
[[Lesson 12_ Attack models.pdf]] [[Lesson 13_ Cryptanalysis using Cryptool 2.pdf]]
Module 6
[[Lesson 14_ Blockchain.pdf]] [[Lesson 15_ Lightweight security.pdf]] [[Lesson 16_ Database Security.pdf]]