Cryptography and Information Systems Security
This CSU30 is the result of more than 10 years experience in teaching and fundamental and applied research in the cryptography, information security, security of computer systems and trustworthy systems areas.
It aims to meet the challenges arising from the ubiquitous nature of information and computer systems in today's society, and from the globalisation of service provision in the development, management and maintenance of the such systems.
This CSU30 focuses on information security and information systems trustworthiness (as interpreted by INFOSEC and
COMPSEC). Cryptography and the implementation/administration of distributed and trustworthy computer systems are seen as the supporting technologies. The integrating context is provided through national and international
standards and legislation for information security.
Scientific Coordination
Learning Outcomes
- Identify the problems in number theory which are most relevant to modern cryptography and discuss the concept of hard problem in this context.
- Explain the fundamental goals of modern cryptography, recognise the cryptographic primitives associated with these goals, and explain the internal operation of the most relevant cryptographic schemes.
- Manage digital certification systems and PKIs and correctly operate current/commercial applications of cryptography.
- Understand and explore the transactional paradigm and software-driven replication in the development of trustworthy systems.
- Know and dominate the different aspects of computer system administration as a tool to ensure their correction and security.
- Know, select and apply secure application development techniques.
Modules
This CSU is organised around 4 thematic modules, which are
compulsory, and one of the 2 complementary modules. These modules are articulated through a shared lab component, the integrated project, which guarantees the experimentation and practical application of the learning outcomes.
- Thematic Modules
- Cryptography and Information Security (CIS)
- Trustworthy Systems (TS)
- Cryptographic Techniques (CT)
- Information Security Management (ISM)
- Módulos Complementares
- Computational Number Theory (CNT)
- Computer Systems Security (CSS)
- Componente Laboratorial
Partners