00-gioithieumonhoc (1).ppt
DESCRIPTION
00-GioiThieuMonHoc (1).pptTRANSCRIPT
-
M ha thng tin v ng dng TS. Trn Minh TritTrng i hc Khoa hc T nhin, HQG-HCMKhoa Cng Ngh Thng Tin
-
Gii thiu chungMn hc ny nhm cung cp cho cc sinh vin cc kin thc lin quan n M ha v ng dng:H thng mt m i xng, H thng mt m bt i xng, Hm bm mt m, Ch k in t, H thng chng nhn kha cng cng Mt s quy trnh bo v thng tin.
-
Gii thiu chungS n v hc trnh 4 tn ch (5 n v hc trnh)Trnh : Sinh vin nm 3-4Phn b thi gian: 45 tit ly thuyt + 30 tit thc hanh
-
Gii thiu chungGing vin l thuyt: TS. Trn Minh Trit [email protected]
Nhm Ging vin ph trch hng dn thc hnh:TS. Trn Minh Trit [email protected] ThS. ng Hi Vn [email protected]
-
Hnh thc kim traL thuyt: 50-60%Cu hi trc nghim + Bi tpThc hnh: Bi tp trong qu trnh hc: 10% ~2-10 bi tp nh Dnh cho mi sinh vinNp theo ct mc quy nh trong hc k n cui kha:30%+10%Lm theo nhm (ti a 2SV)Tm hiu cc chuyn mi: (+20%)Nhm gm ti a 4 SVNhng nhm tm hiu tt c chn trnh by seminar
-
Ni dungCh 1: Tng quan v M ha thng tin & ng dngCh 2: Cc h thng mt m i xng (c in)Ch 3: L thuyt ShannonCh 4: Cc h thng m ha i xng mi (DES, AES)Ch 5: Cc ch hot ng, cc chin lc paddingCh 6: Cc h thng mt m bt i xngCh 7: Ch k in t Ch 8: Hm bm mt m
-
Ni dungCh 9: Chng nhn kha cngCh 10: Secured Socket LayerCh 11: Mt s giao thc trong mng khng dy (WEP, WPA, WPA2)Ch 12: Mt s vn khc (Single Sign-On, Trust Negotiation, Kerberos, Blind-Signature, e-Voting, e-Cash)
-
Ti liu tham khoM ha v ng dngDng Anh c, Trn Minh Trit, NXB i hc Quc gia (2005)M ho thng tin : phng php v ng dng. Bi Don Khanh, Nguyn nh Thc (2005)
-
Ti liu tham khoCryptography Theory and Practice, 3rd editionDouglas R. Stinson, CRC Press (2006). Cryptography and Network Security: Principles and Practice, 4th EditionW. Stallings, Prentice Hall (2005).Handbook of Applied CryptographyMenezes, A., van Oorschot, P., Vanstone, S. (1997), CRC Press, http://cacr.math.uwaterloo.ca/hac/ Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, Bruce Schneier, John Wiley & Sons, Inc (1995).Internet CryptographyRichard E. Smith, Addison-Wesley (1997).