PV204 Security Technologies

Faculty of Informatics
Spring 2025
Extent and Intensity
2/2/2. 5 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
In-person direct teaching
Teacher(s)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (lecturer)
Lukasz Michal Chmielewski, PhD (lecturer)
RNDr. Václav Lorenc (lecturer), doc. RNDr. Petr Švenda, Ph.D. (deputy)
RNDr. Antonín Dufka (assistant)
Guaranteed by
doc. RNDr. Petr Švenda, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Petr Švenda, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 0/36, only registered: 40/36, only registered with preference (fields directly associated with the programme): 23/36
fields of study / plans the course is directly associated with
there are 37 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand the deeper aspects of selected security and applied cryptographic topics. The topics cover cryptographic hardware security, including side-channel attacks, secure authentication, and authorization protocols, trusted boot, analysis of malware and rootkits (both black-box and gray-box), reverse engineering of binary applications, techniques used in Bitcoin cryptocurrency and file/disk encryption. Students should be able to apply the gained knowledge in practice based on experience gained from the laboratory, homework assignments, and extensive project work requiring programming skills.
Learning outcomes
After course completion, the student will be able to:
- explain the security advantages of hardware security element to a typical desktop operating system;
- analyze the implementation of a cryptographic algorithm for a presence of the timing side-channel;
- describe and use good practices for password handling, including password alternatives and their advantages;
- explain principles of key establishment protocols and building blocks of modern secure messaging systems;
- explain principles and used technologies of trusted computing;
- describe the technology behind disk encryption and used encryption modes;
- perform basic analysis of infected computer image;
- implement security-related application utilizing cryptographic smartcard with JavaCard platform and transfer data via a secure channel;
- explain security building blocks of cryptocurrencies like Bitcoin
Syllabus
  • Side-channel attacks (timing, power and fault analysis)
  • Basics of smart cards (PC/SC, APDU, basic applet – JavaCard & .net card & MULTOS), secure programs on JavaCard platform
  • Secure authentication and authorization (common protocols like FIDO U2F and Signal, secure implementation, attacks)
  • Hardware Security Modules (HSM), PKCS#11 API, cryptographic hardware in cloud deployment
  • Trusted boot (TPM, trusted boot process, remote attestation)
  • Micro-architectural attacks against modern CPU (Meltdown, Spectre attacks principle, fixes, exploitability)
  • Black-box analysis of malware (infection vectors, analysis of the environment, network analysis)
  • Grey-box analysis of malware (analysis of memory dumps, tools)
  • Reverse engineering of binary applications (decompiler, disassembler, native-code debugging, binary patching)
  • File and disk encryption (Common architectures, used cryptographic modes, typical attacks)
  • Bitcoin cryptocurrency (P2P Bitcoin network, transactions, mining, second-layer networks like Lighting Network, use of hardware wallets, attacks)
Teaching methods
lectures, hands-on seminars, homework assignments, team programming project
Assessment methods
Two hours per week are scheduled for a lecture, two hours per week scheduled for seminars; otherwise, students work on project and homework assignments in their free time. There are five homework assignments and a collaborative team project. 50 % of points are required to pass the course with mandatory limits also for assignments and project.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
The course is taught annually.
The course is taught: every week.
Teacher's information
This is a relatively advanced security course with moderate programming skills and knowledge of applied cryptography basics.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024.

PV204 Security Technologies

Faculty of Informatics
Spring 2024
Extent and Intensity
2/2/2. 5 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (lecturer)
Lukasz Michal Chmielewski, PhD (lecturer)
RNDr. Václav Lorenc (lecturer), doc. RNDr. Petr Švenda, Ph.D. (deputy)
RNDr. Antonín Dufka (assistant)
Guaranteed by
doc. RNDr. Petr Švenda, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Petr Švenda, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 A217
  • Timetable of Seminar Groups:
PV204/01: Thu 14:00–15:50 B011, P. Švenda
PV204/02: Thu 16:00–17:50 B011, P. Švenda
PV204/03: Thu 10:00–11:50 B011, P. Švenda
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 17/36, only registered: 1/36, only registered with preference (fields directly associated with the programme): 0/36
fields of study / plans the course is directly associated with
there are 70 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand the deeper aspects of selected security and applied cryptographic topics. The topics cover cryptographic hardware security, including side-channel attacks, secure authentication, and authorization protocols, trusted boot, analysis of malware and rootkits (both black-box and gray-box), reverse engineering of binary applications, techniques used in Bitcoin cryptocurrency, micro-architectural attacks like Meltdown and Spectre and file/disk encryption. Students should be able to apply the gained knowledge in practice based on experience gained from the laboratory, homework assignments, and extensive project work.
Learning outcomes
After course completion, the student will be able to:
- explain the security advantages of hardware security element to a typical desktop operating system;
- analyze the implementation of a cryptographic algorithm for a presence of the timing side-channel;
- describe and use good practices for password handling, including password alternatives and their advantages;
- explain principles of key establishment protocols and building blocks of modern secure messaging systems;
- explain principles and used technologies of trusted computing;
- describe the technology behind disk encryption and used encryption modes;
- perform basic analysis of infected computer image;
- implement security-related application utilizing cryptographic smartcard with JavaCard platform and transfer data via a secure channel;
- understand the root cause of micro-architectural attacks against modern CPUs
- explain security building blocks of cryptocurrencies like Bitcoin
Syllabus
  • Side-channel attacks (timing, power and fault analysis)
  • Basics of smart cards (PC/SC, APDU, basic applet – JavaCard & .net card & MULTOS), secure programs on JavaCard platform
  • Secure authentication and authorization (common protocols like FIDO U2F and Signal, secure implementation, attacks)
  • Hardware Security Modules (HSM), PKCS#11 API, cryptographic hardware in cloud deployment
  • Trusted boot (TPM, trusted boot process, remote attestation)
  • Micro-architectural attacks against modern CPU (Meltdown, Spectre attacks principle, fixes, exploitability)
  • Black-box analysis of malware (infection vectors, analysis of the environment, network analysis)
  • Grey-box analysis of malware (analysis of memory dumps, tools)
  • Reverse engineering of binary applications (decompiler, disassembler, native-code debugging, binary patching)
  • File and disk encryption (Common architectures, used cryptographic modes, typical attacks)
  • Bitcoin cryptocurrency (P2P Bitcoin network, transactions, mining, second-layer networks like Lighting Network, use of hardware wallets, attacks)
Teaching methods
lectures, seminars in a security lab, homework assignments, team project
Assessment methods
Two hours per week are scheduled for a lecture, two hours per week scheduled for seminars; otherwise, students work on project and homework assignments in their free time. There are ten homework assignments and a collaborative team project. 50 % of points are required to pass the course.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
Teacher's information
Seminar groups include 10-15 students. The lab is accessible to students (working on PV204 projects and also other projects/thesis) also outside scheduled seminars.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2025.

PV204 Security Technologies

Faculty of Informatics
Spring 2023
Extent and Intensity
2/2/2. 5 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (lecturer)
Lukasz Michal Chmielewski, PhD (lecturer)
RNDr. Václav Lorenc (lecturer), doc. RNDr. Petr Švenda, Ph.D. (deputy)
RNDr. Antonín Dufka (assistant)
Guaranteed by
doc. RNDr. Petr Švenda, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Petr Švenda, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 13. 2. to Mon 15. 5. Mon 12:00–13:50 A318
  • Timetable of Seminar Groups:
PV204/01: Thu 16. 2. to Thu 11. 5. Thu 10:00–11:50 A403, P. Švenda
PV204/02: Thu 16. 2. to Thu 11. 5. Thu 14:00–15:50 A403, P. Švenda
PV204/03: Thu 16. 2. to Thu 11. 5. Thu 16:00–17:50 A403, P. Švenda
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 14/36, only registered: 0/36, only registered with preference (fields directly associated with the programme): 0/36
fields of study / plans the course is directly associated with
there are 70 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand the deeper aspects of selected security and applied cryptographic topics. The topics cover cryptographic hardware security, including side-channel attacks, secure authentication, and authorization protocols, trusted boot, analysis of malware and rootkits (both black-box and gray-box), reverse engineering of binary applications, techniques used in Bitcoin cryptocurrency, micro-architectural attacks like Meltdown and Spectre and file/disk encryption. Students should be able to apply the gained knowledge in practice based on experience gained from the laboratory, homework assignments, and extensive project work.
Learning outcomes
After course completion, the student will be able to:
- explain the security advantages of hardware security element to a typical desktop operating system;
- analyze the implementation of a cryptographic algorithm for a presence of the timing side-channel;
- describe and use good practices for password handling, including password alternatives and their advantages;
- explain principles of key establishment protocols and building blocks of modern secure messaging systems;
- explain principles and used technologies of trusted computing;
- describe the technology behind disk encryption and used encryption modes;
- perform basic analysis of infected computer image;
- implement security-related application utilizing cryptographic smartcard with JavaCard platform and transfer data via a secure channel;
- understand the root cause of micro-architectural attacks against modern CPUs
- explain security building blocks of cryptocurrencies like Bitcoin
Syllabus
  • Side-channel attacks (timing, power and fault analysis)
  • Basics of smart cards (PC/SC, APDU, basic applet – JavaCard & .net card & MULTOS), secure programs on JavaCard platform
  • Secure authentication and authorization (common protocols like FIDO U2F and Signal, secure implementation, attacks)
  • Hardware Security Modules (HSM), PKCS#11 API, cryptographic hardware in cloud deployment
  • Trusted boot (TPM, trusted boot process, remote attestation)
  • Micro-architectural attacks against modern CPU (Meltdown, Spectre attacks principle, fixes, exploitability)
  • Black-box analysis of malware (infection vectors, analysis of the environment, network analysis)
  • Grey-box analysis of malware (analysis of memory dumps, tools)
  • Reverse engineering of binary applications (decompiler, disassembler, native-code debugging, binary patching)
  • File and disk encryption (Common architectures, used cryptographic modes, typical attacks)
  • Bitcoin cryptocurrency (P2P Bitcoin network, transactions, mining, second-layer networks like Lighting Network, use of hardware wallets, attacks)
Teaching methods
lectures, seminars in a security lab, homework assignments, team project
Assessment methods
Two hours per week are scheduled for a lecture, two hours per week scheduled for seminars; otherwise, students work on project and homework assignments in their free time. There are ten homework assignments and a collaborative team project. 50 % of points are required to pass the course.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
Teacher's information
Seminar groups include 10-15 students. The lab is accessible to students (working on PV204 projects and also other projects/thesis) also outside scheduled seminars.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2024, Spring 2025.

PV204 Security Technologies

Faculty of Informatics
Spring 2022
Extent and Intensity
2/2/2. 5 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (lecturer)
Lukasz Michal Chmielewski, PhD (lecturer)
RNDr. Václav Lorenc (lecturer), doc. RNDr. Petr Švenda, Ph.D. (deputy)
Mgr. Milan Patnaik (lecturer), doc. RNDr. Petr Švenda, Ph.D. (deputy)
RNDr. Antonín Dufka (assistant)
Guaranteed by
doc. RNDr. Petr Švenda, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Petr Švenda, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 15. 2. to Tue 10. 5. Tue 12:00–13:50 A217
  • Timetable of Seminar Groups:
PV204/01: Thu 17. 2. to Thu 12. 5. Thu 10:00–11:50 A403, P. Švenda
PV204/02: Thu 17. 2. to Thu 12. 5. Thu 14:00–15:50 A403, P. Švenda
PV204/03: Thu 17. 2. to Thu 12. 5. Thu 16:00–17:50 A403, P. Švenda, IMPORTANT: This is a backup group, will be opened when remaining groups are full
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 2/36, only registered: 0/36, only registered with preference (fields directly associated with the programme): 0/36
fields of study / plans the course is directly associated with
there are 70 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand the deeper aspects of selected security and applied cryptographic topics. The topics cover cryptographic hardware security, including side-channel attacks, secure authentication, and authorization protocols, trusted boot, analysis of malware and rootkits (both black-box and gray-box), reverse engineering of binary applications, techniques used in Bitcoin cryptocurrency, micro-architectural attacks like Meltdown and Spectre and file/disk encryption. Students should be able to apply the gained knowledge in practice based on experience gained from the laboratory, homework assignments, and extensive project work.
Learning outcomes
After course completion, the student will be able to:
- explain the security advantages of hardware security element to a typical desktop operating system;
- analyze the implementation of a cryptographic algorithm for a presence of the timing side-channel;
- describe and use good practices for password handling, including password alternatives and their advantages;
- explain principles of key establishment protocols and building blocks of modern secure messaging systems;
- explain principles and used technologies of trusted computing;
- describe the technology behind disk encryption and used encryption modes;
- perform basic analysis of infected computer image;
- implement security-related application utilizing cryptographic smartcard with JavaCard platform and transfer data via a secure channel;
- understand the root cause of micro-architectural attacks against modern CPUs
- explain security building blocks of cryptocurrencies like Bitcoin
Syllabus
  • Side-channel attacks (timing, power and fault analysis)
  • Basics of smart cards (PC/SC, APDU, basic applet – JavaCard & .net card & MULTOS), secure programs on JavaCard platform
  • Secure authentication and authorization (common protocols like FIDO U2F and Signal, secure implementation, attacks)
  • Hardware Security Modules (HSM), PKCS#11 API, cryptographic hardware in cloud deployment
  • Trusted boot (TPM, trusted boot process, remote attestation)
  • Micro-architectural attacks against modern CPU (Meltdown, Spectre attacks principle, fixes, exploitability)
  • Black-box analysis of malware (infection vectors, analysis of the environment, network analysis)
  • Grey-box analysis of malware (analysis of memory dumps, tools)
  • Reverse engineering of binary applications (decompiler, disassembler, native-code debugging, binary patching)
  • File and disk encryption (Common architectures, used cryptographic modes, typical attacks)
  • Bitcoin cryptocurrency (P2P Bitcoin network, transactions, mining, second-layer networks like Lighting Network, use of hardware wallets, attacks)
Teaching methods
lectures, seminars in a security lab, homework assignments, team project
Assessment methods
Two hours per week are scheduled for a lecture, two hours per week scheduled for seminars; otherwise, students work on project and homework assignments in their free time. There are ten homework assignments and a collaborative team project. 50 % of points are required to pass the course.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
Teacher's information
Seminar groups include 10-15 students. The lab is accessible to students (working on PV204 projects and also other projects/thesis) also outside scheduled seminars.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2023, Spring 2024, Spring 2025.

PV204 Security Technologies

Faculty of Informatics
Spring 2021
Extent and Intensity
2/2/2. 5 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (lecturer)
RNDr. Václav Lorenc (lecturer), doc. RNDr. Petr Švenda, Ph.D. (deputy)
Mgr. Milan Patnaik (lecturer), doc. RNDr. Petr Švenda, Ph.D. (deputy)
RNDr. Antonín Dufka (assistant)
Guaranteed by
doc. RNDr. Petr Švenda, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Petr Švenda, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 Virtuální místnost
  • Timetable of Seminar Groups:
PV204/01: Thu 10:00–11:50 A403, M. Brož, V. Bukač, V. Lorenc, M. Patnaik, P. Švenda
PV204/02: Thu 14:00–15:50 A403, M. Brož, V. Bukač, V. Lorenc, M. Patnaik, P. Švenda
PV204/03: Thu 16:00–17:50 A403, M. Brož, V. Bukač, V. Lorenc, M. Patnaik, P. Švenda
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 0/36, only registered: 0/36, only registered with preference (fields directly associated with the programme): 0/36
fields of study / plans the course is directly associated with
there are 70 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand the deeper aspects of selected security and applied cryptographic topics. The topics cover cryptographic hardware security, including side-channel attacks, secure authentication, and authorization protocols, trusted boot, analysis of malware and rootkits (both black-box and gray-box), reverse engineering of binary applications, techniques used in Bitcoin cryptocurrency, micro-architectural attacks like Meltdown and Spectre and file/disk encryption. Students should be able to apply the gained knowledge in practice based on experience gained from the laboratory, homework assignments, and extensive project work.
Learning outcomes
After course completion, the student will be able to:
- explain the security advantages of hardware security element to a typical desktop operating system;
- analyze the implementation of a cryptographic algorithm for a presence of the timing side-channel;
- describe and use good practices for password handling, including password alternatives and their advantages;
- explain principles of key establishment protocols and building blocks of modern secure messaging systems;
- explain principles and used technologies of trusted computing;
- describe the technology behind disk encryption and used encryption modes;
- perform basic analysis of infected computer image;
- implement security-related application utilizing cryptographic smartcard with JavaCard platform and transfer data via a secure channel;
- understand the root cause of micro-architectural attacks against modern CPUs
- explain security building blocks of cryptocurrencies like Bitcoin
Syllabus
  • Side-channel attacks (timing, power and fault analysis)
  • Basics of smart cards (PC/SC, APDU, basic applet – JavaCard & .net card & MULTOS), secure programs on JavaCard platform
  • Secure authentication and authorization (common protocols like FIDO U2F and Signal, secure implementation, attacks)
  • Hardware Security Modules (HSM), PKCS#11 API, cryptographic hardware in cloud deployment
  • Trusted boot (TPM, trusted boot process, remote attestation)
  • Micro-architectural attacks against modern CPU (Meltdown, Spectre attacks principle, fixes, exploitability)
  • Black-box analysis of malware (infection vectors, analysis of the environment, network analysis)
  • Grey-box analysis of malware (analysis of memory dumps, tools)
  • Reverse engineering of binary applications (decompiler, disassembler, native-code debugging, binary patching)
  • File and disk encryption (Common architectures, used cryptographic modes, typical attacks)
  • Bitcoin cryptocurrency (P2P Bitcoin network, transactions, mining, second-layer networks like Lighting Network, use of hardware wallets, attacks)
Teaching methods
lectures, seminars in a security lab, homework assignments, team project
Assessment methods
Two hours per week are scheduled for a lecture, two hours per week scheduled for seminars; otherwise, students work on project and homework assignments in their free time. There are ten homework assignments and a collaborative team project. 50 % of points are required to pass the course.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
Teacher's information
Seminar groups include 10-15 students. The lab is accessible to students (working on PV204 projects and also other projects/thesis) also outside scheduled seminars.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Security Technologies

Faculty of Informatics
Spring 2020
Extent and Intensity
2/2/2. 5 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (lecturer)
RNDr. Václav Lorenc (lecturer), doc. RNDr. Petr Švenda, Ph.D. (deputy)
Guaranteed by
doc. RNDr. Petr Švenda, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Petr Švenda, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 17. 2. to Fri 15. 5. Mon 16:00–17:50 A318
  • Timetable of Seminar Groups:
PV204/01: Mon 17. 2. to Fri 15. 5. Thu 10:00–11:50 A403, M. Brož, V. Bukač, V. Lorenc, P. Švenda
PV204/02: Mon 17. 2. to Fri 15. 5. Thu 14:00–15:50 A403, M. Brož, V. Bukač, V. Lorenc, P. Švenda
PV204/03: Mon 17. 2. to Fri 15. 5. Thu 16:00–17:50 A403, M. Brož, V. Bukač, V. Lorenc, P. Švenda
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 0/36, only registered: 0/36, only registered with preference (fields directly associated with the programme): 0/36
fields of study / plans the course is directly associated with
there are 70 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of smart cards security, secure authentication and authorization, security of hardware modules, trusted boot, analysis of malware and rootkits (both black-box and gray-box), reverse engineering of binary applications, multilevel security and file/disk encryption. Student should be able to apply the gained knowledge in a practice based on experience gained from laboratory a project work.
Learning outcomes
After a course completion, the student will be able to:
- explain the security advantages of hardware security element to a typical desktop operating system;
- analyze the implementation of a cryptographic algorithm for a presence of the timing side-channel;
- describe and use good practices for password handling;
- explain principles of key establishment protocols and building blocks of modern secure messaging systems;
- explain principles and used technologies of trusted computing;
- describe the technology behind disk encryption and used encryption modes;
- perform basic analysis of infected computer image;
- implement security-related application utilizing cryptographic smartcard with JavaCard platform and transfer data via a secure channel;
- perform basic analysis of infected computer image;
Syllabus
  • Side channel attacks (timing, power and fault analysis)
  • Basics of smart cards (PC/SC, APDU, basic applet – JavaCard & .net card & MULTOS)
  • Secure programs on JavaCard platform
  • Secure authentication and authorization (common protocols, secure implementation, attacks)
  • Hardware Security Modules (HSM), PKCS#11 API
  • Trusted boot (TPM, trusted boot process, remote attestation)
  • Black-box analysis of malware (infection vectors, analysis of environment, network analysis)
  • Grey-box analysis of malware (analysis of memory dumps, tools)
  • Reverse engineering of binary applications (decompiler, disassembler, native-code debugging, binary patching)
  • Windows and Linux Rootkits (User-mode, kernel-mode, Hypervisor-level, software vs. hardware level, bootkits)
  • Multilevel security (isolation, confinement, security kernels)
  • File and disk encryption (Common architectures, used cryptographic modes, typical attacks)
Teaching methods
lectures, seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for lecture, two hours per week scheduled for seminars, otherwise students work on projects, homework etc. in their free time. There are 6 homeworks and collaborative project. 50 % of points are required to pass the course.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Security Technologies

Faculty of Informatics
Spring 2019
Extent and Intensity
2/2/2. 6 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (lecturer)
RNDr. Petr Ročkai, Ph.D. (lecturer)
RNDr. Václav Lorenc (seminar tutor), doc. RNDr. Petr Švenda, Ph.D. (deputy)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Petr Švenda, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 19. 2. to Tue 14. 5. Tue 18:00–19:50 A320
  • Timetable of Seminar Groups:
PV204/01: Thu 21. 2. to Thu 16. 5. Thu 10:00–11:50 A403, P. Švenda
PV204/02: Thu 21. 2. to Thu 16. 5. Thu 14:00–15:50 A403, P. Švenda
PV204/03: Thu 21. 2. to Thu 16. 5. Thu 16:00–17:50 A403, P. Švenda
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 0/36, only registered: 0/36, only registered with preference (fields directly associated with the programme): 0/36
fields of study / plans the course is directly associated with
there are 33 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of smart cards security, secure authentication and authorization, security of hardware modules, trusted boot, analysis of malware and rootkits (both black-box and gray-box), reverse engineering of binary applications, multilevel security and file/disk encryption. Student should be able to apply the gained knowledge in a practice based on experience gained from laboratory a project work.
Learning outcomes
After a course completion, the student will be able to:
- explain the security advantages of hardware security element to a typical desktop operating system;
- analyze the implementation of a cryptographic algorithm for a presence of the timing side-channel;
- describe and use good practices for password handling;
- explain principles of key establishment protocols and building blocks of modern secure messaging systems;
- explain principles and used technologies of trusted computing;
- describe the technology behind disk encryption and used encryption modes;
- perform basic analysis of infected computer image;
- implement security-related application utilizing cryptographic smartcard with JavaCard platform and transfer data via a secure channel;
- perform basic analysis of infected computer image;
Syllabus
  • Side channel attacks (timing, power and fault analysis)
  • Basics of smart cards (PC/SC, APDU, basic applet – JavaCard & .net card & MULTOS)
  • Secure programs on JavaCard platform
  • Secure authentication and authorization (common protocols, secure implementation, attacks)
  • Hardware Security Modules (HSM), PKCS#11 API
  • Trusted boot (TPM, trusted boot process, remote attestation)
  • Black-box analysis of malware (infection vectors, analysis of environment, network analysis)
  • Grey-box analysis of malware (analysis of memory dumps, tools)
  • Reverse engineering of binary applications (decompiler, disassembler, native-code debugging, binary patching)
  • Windows and Linux Rootkits (User-mode, kernel-mode, Hypervisor-level, software vs. hardware level, bootkits)
  • Multilevel security (isolation, confinement, security kernels)
  • File and disk encryption (Common architectures, used cryptographic modes, typical attacks)
Teaching methods
lectures, seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for lecture, two hours per week scheduled for seminars, otherwise students work on projects, homework etc. in their free time. There are 6 homeworks and collaborative project. 50 % of points are required to pass the course.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Security Technologies

Faculty of Informatics
Spring 2018
Extent and Intensity
2/2/2. 6 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (lecturer)
RNDr. Václav Lorenc (seminar tutor), doc. RNDr. Petr Švenda, Ph.D. (deputy)
RNDr. Petr Ročkai, Ph.D. (seminar tutor)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Petr Švenda, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 12:00–13:50 A217
  • Timetable of Seminar Groups:
PV204/01: Thu 10:00–11:50 A403, P. Švenda
PV204/02: Thu 14:00–15:50 A403, P. Švenda
PV204/03: Thu 16:00–17:50 A403, P. Švenda
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 0/36, only registered: 0/36, only registered with preference (fields directly associated with the programme): 0/36
fields of study / plans the course is directly associated with
there are 33 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of smart cards security, secure authentication and authorization, security of hardware modules, trusted boot, analysis of malware and rootkits (both black-box and gray-box), reverse engineering of binary applications, multilevel security and file/disk encryption. Student should be able to apply the gained knowledge in a practice based on experience gained from laboratory a project work.
Learning outcomes
After a course completion, the student will be able to:
- explain the security advantages of hardware security element to a typical desktop operating system;
- analyze the implementation of a cryptographic algorithm for a presence of the timing side-channel;
- describe and use good practices for password handling;
- explain principles of key establishment protocols and building blocks of modern secure messaging systems;
- explain principles and used technologies of trusted computing;
- describe the technology behind disk encryption and used encryption modes;
- perform basic analysis of infected computer image;
- implement security-related application utilizing cryptographic smartcard with JavaCard platform and transfer data via a secure channel;
- perform basic analysis of infected computer image;
Syllabus
  • Side channel attacks (timing, power and fault analysis)
  • Basics of smart cards (PC/SC, APDU, basic applet – JavaCard & .net card & MULTOS)
  • Secure programs on JavaCard platform
  • Secure authentication and authorization (common protocols, secure implementation, attacks)
  • Hardware Security Modules (HSM), PKCS#11 API
  • Trusted boot (TPM, trusted boot process, remote attestation)
  • Black-box analysis of malware (infection vectors, analysis of environment, network analysis)
  • Grey-box analysis of malware (analysis of memory dumps, tools)
  • Reverse engineering of binary applications (decompiler, disassembler, native-code debugging, binary patching)
  • Windows and Linux Rootkits (User-mode, kernel-mode, Hypervisor-level, software vs. hardware level, bootkits)
  • Multilevel security (isolation, confinement, security kernels)
  • File and disk encryption (Common architectures, used cryptographic modes, typical attacks)
Teaching methods
lectures, seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for lecture, two hours per week scheduled for seminars, otherwise students work on projects, homework etc. in their free time. There are 6 homeworks and collaborative project. 50 % of points are required to pass the course.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Security Technologies

Faculty of Informatics
Spring 2017
Extent and Intensity
2/2/2. 6 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (lecturer)
RNDr. Petr Ročkai, Ph.D. (lecturer)
RNDr. Václav Lorenc (seminar tutor), doc. RNDr. Petr Švenda, Ph.D. (deputy)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Petr Švenda, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 18:00–19:50 A218
  • Timetable of Seminar Groups:
PV204/01: Thu 10:00–11:50 A403, P. Švenda
PV204/02: Thu 14:00–15:50 A403, P. Švenda
PV204/03: Thu 16:00–17:50 A403, P. Švenda
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 0/36, only registered: 0/36, only registered with preference (fields directly associated with the programme): 0/36
fields of study / plans the course is directly associated with
there are 33 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of smart cards security, secure authentication and authorization, security of hardware modules, trusted boot, analysis of malware and rootkits (both black-box and gray-box), reverse engineering of binary applications, multilevel security and file/disk encryption. Student should be able to apply the gained knowledge in a practice based on experience gained from laboratory a project work.
Syllabus
  • Side channel attacks (timing, power and fault analysis)
  • Basics of smart cards (PC/SC, APDU, basic applet – JavaCard & .net card & MULTOS)
  • Secure programs on JavaCard platform
  • Secure authentication and authorization (common protocols, secure implementation, attacks)
  • Hardware Security Modules (HSM), PKCS#11 API
  • Trusted boot (TPM, trusted boot process, remote attestation)
  • Black-box analysis of malware (infection vectors, analysis of environment, network analysis)
  • Grey-box analysis of malware (analysis of memory dumps, tools)
  • Reverse engineering of binary applications (decompiler, disassembler, native-code debugging, binary patching)
  • Windows and Linux Rootkits (User-mode, kernel-mode, Hypervisor-level, software vs. hardware level, bootkits)
  • Multilevel security (isolation, confinement, security kernels)
  • File and disk encryption (Common architectures, used cryptographic modes, typical attacks)
Teaching methods
lectures, seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for lecture, two hours per week scheduled for seminars, otherwise students work on projects, homework etc. in their free time. There are 6 homeworks and collaborative project. 50 % of points are required to pass the course.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Security Technologies

Faculty of Informatics
Spring 2016
Extent and Intensity
2/2/2. 6 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
RNDr. Václav Lorenc (seminar tutor), doc. RNDr. Petr Švenda, Ph.D. (deputy)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Petr Švenda, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Thu 8:00–9:50 A217
  • Timetable of Seminar Groups:
PV204/01: Thu 10:00–11:50 A403, Z. Říha, P. Švenda
PV204/02: Thu 14:00–15:50 A403, Z. Říha, P. Švenda
PV204/03: Thu 16:00–17:50 A403, Z. Říha, P. Švenda
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 0/36, only registered: 0/36, only registered with preference (fields directly associated with the programme): 0/36
fields of study / plans the course is directly associated with
there are 33 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of smart cards security, secure authentication and authorization, security of hardware modules, trusted boot, analysis of malware and rootkits (both black-box and gray-box), reverse engineering of binary applications, multilevel security and file/disk encryption. Student should be able to apply the gained knowledge in a practice based on experience gained from laboratory a project work.
Syllabus
  • Side channel attacks (timing, power and fault analysis)
  • Basics of smart cards (PC/SC, APDU, basic applet – JavaCard & .net card & MULTOS)
  • Secure programs on JavaCard platform
  • Secure authentication and authorization (common protocols, secure implementation, attacks)
  • Hardware Security Modules (HSM), PKCS#11 API
  • Trusted boot (TPM, trusted boot process, remote attestation)
  • Black-box analysis of malware (infection vectors, analysis of environment, network analysis)
  • Grey-box analysis of malware (analysis of memory dumps, tools)
  • Reverse engineering of binary applications (decompiler, disassembler, native-code debugging, binary patching)
  • Windows and Linux Rootkits (User-mode, kernel-mode, Hypervisor-level, software vs. hardware level, bootkits)
  • Multilevel security (isolation, confinement, security kernels)
  • File and disk encryption (Common architectures, used cryptographic modes, typical attacks)
Teaching methods
lectures, seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for lecture, two hours per week scheduled for seminars, otherwise students work on projects, homework etc. in their free time. There are 6 homeworks and collaborative project. 50 % of points are required to pass the course.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Laboratory of security and applied cryptography II

Faculty of Informatics
Spring 2015
Extent and Intensity
0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: k (colloquium). Other types of completion: z (credit).
Teacher(s)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (seminar tutor)
Mgr. Vít Bukač, Ph.D. (seminar tutor)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
RNDr. Marek Kumpošt, Ph.D. (seminar tutor)
RNDr. Václav Lorenc (seminar tutor)
RNDr. Marián Novotný, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PV204/01: Mon 16:00–17:50 A403, Z. Říha
PV204/02: Mon 14:00–15:50 A403, Z. Říha
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 32 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of biometric authentication systems and be able to apply the gained knowledge in practice. At the end of the course students also will be able to understand the principles of network security and identify weak points in networks.
Syllabus
  • Biometric systems (error rates, keyboard typing, voice verification, face recognition, fingerprints and their security, calculation of error rates). Network security (eavesdropping, security of active network entities, IDS systems, vulnerability scanning, wireless networks). Security of operating systems (Windows, Linux, rootkits, viruses, web applications).
Literature
  • Handbook of biometrics. Edited by Patrick J. Flynn - Arun A. Ross - Anil K. Jain. New York: Springer, 2008, x, 556. ISBN 9780387710402. info
  • STALLINGS, William. Cryptography and network security : principles and practice. 4th ed. Upper Saddle River, N.J.: Pearson/Prentice Hall, 2006, xvi, 680. ISBN 0131873164. info
  • JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
Teaching methods
seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 13 homeworks (10 points each). To get the credit (Z) 50% of the points are required.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Laboratory of security and applied cryptography II

Faculty of Informatics
Spring 2014
Extent and Intensity
0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: k (colloquium). Other types of completion: z (credit).
Teacher(s)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (seminar tutor)
Mgr. Vít Bukač, Ph.D. (seminar tutor)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
RNDr. Marek Kumpošt, Ph.D. (seminar tutor)
RNDr. Václav Lorenc (seminar tutor)
RNDr. Marián Novotný, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PV204/01: Mon 16:00–17:50 G191a, M. Kumpošt, Z. Říha, P. Švenda
PV204/02: Mon 10:00–11:50 G191a, M. Kumpošt, Z. Říha, P. Švenda
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 32 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of biometric authentication systems and be able to apply the gained knowledge in practice. At the end of the course students also will be able to understand the principles of network security and identify weak points in networks.
Syllabus
  • Biometric systems (error rates, keyboard typing, voice verification, face recognition, fingerprints and their security, calculation of error rates). Network security (eavesdropping, security of active network entities, IDS systems, vulnerability scanning, wireless networks). Security of operating systems (Windows, Linux, rootkits, viruses, web applications).
Literature
  • Handbook of biometrics. Edited by Patrick J. Flynn - Arun A. Ross - Anil K. Jain. New York: Springer, 2008, x, 556. ISBN 9780387710402. info
  • STALLINGS, William. Cryptography and network security : principles and practice. 4th ed. Upper Saddle River, N.J.: Pearson/Prentice Hall, 2006, xvi, 680. ISBN 0131873164. info
  • JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
Teaching methods
seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 13 homeworks (10 points each). To get the credit (Z) 50% of the points are required.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Laboratory of security and applied cryptography II

Faculty of Informatics
Spring 2013
Extent and Intensity
0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: k (colloquium). Other types of completion: z (credit).
Teacher(s)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (seminar tutor)
RNDr. Filip Jurnečka, Ph.D. (seminar tutor)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
RNDr. Marek Kumpošt, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PV204/01: Mon 14:00–15:50 G191a, V. Bukač, F. Jurnečka, J. Krhovják, M. Kumpošt, Z. Říha, P. Švenda
PV204/02: Mon 16:00–17:50 G191a, V. Bukač, F. Jurnečka, J. Krhovják, M. Kumpošt, Z. Říha, P. Švenda
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Win32; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 32 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of biometric authentication systems and be able to apply the gained knowledge in practice. At the end of the course students also will be able to understand the principles of network security and identify weak points in networks.
Syllabus
  • Biometric systems (error rates, keyboard typing, voice verification, face recognition, fingerprints and their security, calculation of error rates). Network security (eavesdropping, security of active network entities, IDS systems, vulnerability scanning, wireless networks). Security of operating systems (Windows, Linux, rootkits, viruses, web applications).
Literature
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
Teaching methods
seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 14 homeworks (10 points each). To get the credit (Z) 50% of the points are required.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Laboratory of security and applied cryptography II

Faculty of Informatics
Spring 2012
Extent and Intensity
0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: z (credit). Other types of completion: k (colloquium).
Teacher(s)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (seminar tutor)
Mgr. Jaromír Dobiáš (seminar tutor)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
RNDr. Marek Kumpošt, Ph.D. (seminar tutor)
Mgr. Tobiáš Smolka (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
prof. RNDr. Luděk Matyska, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PV204/01: Mon 18:00–19:50 G191a, Z. Říha
PV204/02: Mon 16:00–17:50 G191a, Z. Říha
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Win32; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 37 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of biometric authentication systems and be able to apply the gained knowledge in practice. At the end of the course students also will be able to understand the principles of network security and identify weak points in networks.
Syllabus
  • Biometric systems (error rates, keyboard typing, voice verification, face recognition, fingerprints and their security, calculation of error rates). Network security (eavesdropping, security of active network entities, IDS systems, vulnerability scanning, wireless networks). Security of operating systems (Windows, Linux, rootkits, viruses, web applications).
Literature
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
Teaching methods
seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 14 homeworks (10 points each). To get the credit (Z) 50% of the points are required.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Laboratory of security and applied cryptography II

Faculty of Informatics
Spring 2011
Extent and Intensity
0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: z (credit). Other types of completion: k (colloquium).
Teacher(s)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
RNDr. Marek Kumpošt, Ph.D. (seminar tutor)
RNDr. Václav Lorenc (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Timetable of Seminar Groups
PV204/01: Thu 9:00–10:50 4.130a, J. Krhovják, M. Kumpošt, Z. Říha, P. Švenda
PV204/02: No timetable has been entered into IS. J. Krhovják, M. Kumpošt, Z. Říha, P. Švenda
Prerequisites
Registration to PV204 requires: 1) ability to work independently; 2) long-term interest in IT security (having done another IT security and/or cryptology courses and description of your interest in 3-10 sentences); 3) programming skills (ideally C and Java) under Unix/Linux or Win32; 4) fluent English; 5) team work ability.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 40 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of biometric authentication systems and be able to apply the gained knowledge in practice. At the end of the course students also will be able to understand the principles of network security and identify weak points in networks.
Syllabus
  • Biometric systems (error rates, keyboard typing, voice verification, face recognition, fingerprints and their security, calculation of error rates). Network security (eavesdropping, security of active network entities, IDS systems, vulnerability scanning, wireless networks). Security of operating systems (Windows, Linux, rootkits, viruses, web applications).
Literature
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
Teaching methods
seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 14 homeworks (10 points each). To get the credit (Z) 50% of the points are required.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Laboratory of security and applied cryptography II

Faculty of Informatics
Spring 2010
Extent and Intensity
0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: z (credit). Other types of completion: k (colloquium).
Teacher(s)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
RNDr. Marek Kumpošt, Ph.D. (seminar tutor)
RNDr. Václav Lorenc (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
RNDr. Roman Žilka (seminar tutor)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Timetable
Wed 8:00–9:50 4.130a, Wed 10:00–11:50 4.130a
  • Timetable of Seminar Groups:
PV204/01: No timetable has been entered into IS. J. Krhovják, M. Kumpošt, V. Lorenc, V. Matyáš, Z. Říha, P. Švenda, P. Tuček
PV204/02: No timetable has been entered into IS. J. Krhovják, M. Kumpošt, V. Lorenc, V. Matyáš, Z. Říha, P. Švenda, P. Tuček
Prerequisites
Registration to PV204 requires: 1) ability to work independently; 2) long-term interest in IT security (having done another IT security and/or cryptology courses and description of your interest in 3-10 sentences); 3) programming skills (ideally C and Java) under Unix/Linux or Win32; 4) fluent English; 5) team work ability.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 36 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of biometric authentication systems and be able to apply the gained knowledge in practice. At the end of the course students also will be able to understand the principles of network security and identify weak points in networks.
Syllabus
  • Biometric systems (error rates, keyboard typing, voice verification, face recognition, fingerprints and their security, calculation of error rates). Network security (eavesdropping, security of active network entities, IDS systems, vulnerability scanning, wireless networks). Security of operating systems (Windows, Linux, rootkits, viruses, web applications).
Literature
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
Teaching methods
seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 14 homeworks (10 points each). To get the credit (Z) 50% of the points are required.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Laboratory of security and applied cryptography II

Faculty of Informatics
Spring 2009
Extent and Intensity
0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: z (credit). Other types of completion: k (colloquium).
Teacher(s)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
RNDr. Marek Kumpošt, Ph.D. (seminar tutor)
RNDr. Václav Lorenc (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Mgr. Pavel Tuček (seminar tutor)
RNDr. Roman Žilka (seminar tutor)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Timetable of Seminar Groups
PV204/01: Mon 10:00–11:50 C516, J. Krhovják, M. Kumpošt, V. Lorenc, V. Matyáš, Z. Říha, P. Švenda, P. Tuček
PV204/02: Mon 14:00–15:50 C516, J. Krhovják, M. Kumpošt, V. Lorenc, V. Matyáš, Z. Říha, P. Švenda, P. Tuček
Prerequisites
Registration to PV181 requires: 1) ability to work independently; 2) long-term interest in IT security (having done another IT security and/or cryptology courses and description of your interest in 3-10 sentences); 3) programming skills (ideally C and Java) under Unix/Linux or Win32; 4) fluent English; 5) team work ability.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 37 fields of study the course is directly associated with, display
Course objectives
Students work an various aspects of cryptography and IT security, also help with the research projects of the lab (LaBAK - the Laboratory of security and applied cryptography).
Syllabus
  • Biometric systems (error rates, keyboard typing, voice verification, face recognition, fingerprints and their security, calculation of error rates). Network security (eavesdropping, security of active network entities, IDS systems, vulnerability scanning, wireless networks). Security of operating systems (Windows, Linux, rootkits, viruses, web applications).
Literature
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
Assessment methods
Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 14 homeworks (10 points each). To get the credit (Z) 50% of the points are required.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.

PV204 Laboratory of security and applied cryptography II

Faculty of Informatics
Spring 2008
Extent and Intensity
0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: z (credit). Other types of completion: k (colloquium).
Teacher(s)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
RNDr. Marek Kumpošt, Ph.D. (seminar tutor)
RNDr. Václav Lorenc (seminar tutor)
RNDr. Andrij Stecko, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Mgr. Pavel Tuček (seminar tutor)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Timetable
Mon 14:00–15:50 C516, Tue 9:00–10:50 C516
Prerequisites
Registration to PV181 requires: 1) ability to work independently; 2) long-term interest in IT security (having done another IT security and/or cryptology courses and description of your interest in 3-10 sentences); 3) programming skills (ideally C and Java) under Unix/Linux or Win32; 4) fluent English; 5) team work ability.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 37 fields of study the course is directly associated with, display
Course objectives
Students work an various aspects of cryptography and IT security, also help with the research projects of the lab (LaBAK - the Laboratory of security and applied cryptography).
Syllabus
  • Biometric systems (error rates, keyboard typing, voice verification, face recognition, fingerprints and their security, calculation of error rates). Network security (eavesdropping, security of active network entities, IDS systems, vulnerability scanning, wireless networks). Security of operating systems (Windows, Linux, rootkits, viruses, web applications).
Assessment methods (in Czech)
Výuka je jen zčásti rozvrhována, jinak studenti pracují podle vlastního uvážení a možností na úkolech zadaných vyučujícími. Domácích úkolů je celkem 14 po 10 bodech. Pro získání zápočtu je třeba získat 50 % bodů. Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 14 homeworks (10 points each). To get the credit (Z) 50% of the points are required.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.
  • Enrolment Statistics (recent)