|Type of course:
||Elective (1 of 2)
|Language of instruction:
|Erasmus Language of instruction:
|Name of lecturer:
|Form of education
|Form of instruction:
|Number of teaching hours per semester:
|Number of teaching hours per week:
|Form of receiving a credit for a course:
|Number of ECTS credits allocated
The identification of appropriate methodologies for software systems development
acquiring fundamental knowledge regarding the main concepts of Criptography
the correct use of criptographic tools in programming
Course Entry Requirements:
Computational algebra, Computer programming
1 Brief history of cryptography. Basic concepts.
2 Cryptographic technologies
3 Hiding information Steganography
4 Systems encrypted by secret keys (symmetrical).
5 Public key encryption systems (asymmetric). Certification systems a public keys.
6 Digital signature.
8 Public key infrastructure.
9 Computer attacks Cross Scripting SQL injection
Lecture, seminary laboratory
Knowledge on Criptography and secure programming good parctices
Learning outcomes verification and assessment criteria:
Final comprehensive Project, minimum grade 5 out of 10
Applied Cryptography – Protocols, Algorithms and Source Code in C. Second Edition, John Willey & Sons
A. J. Menezes, , Paul von Oorschot, S. A. Vanstone,,
Handbook of Applied Cryptography, CRC Press
M. Howard, D. LeBlanc,
Writing Secure Code, Practical strategies and techniques for secure application coding in a networked world, Micrsoft