Computer Enginering
Lesson Code Course Name Class Credit Lesson Time Weekly Lesson Hours (Theoretical) Weekly Lesson Hours (Practice) Weekly Class Hours (Laboratory)
KAKT3208 Computer information protection technology Үшінші курс 5 150 1 2 3
Course Descriptions
Kazakh
PhD, A.N. Amanov

The discipline includes the basic provisions on the means of protecting computer information with modern organizational,technical, algorithmic and other methods of protecting computer information used in modern cryptosystems, the most common types of ciphers and their methods of cryptanalysis, concepts of Information Integrity, cryptographic protocols, basic provisions on electronic signatures. The course develops skills in the use of cryptographic methods in organizing work on Information Protection

Business Analyst and IT project management  

Algorithms, Data Structures and programming

Group work, brainstorming, Case study method, group project work method.

1can assess threats to the security of Information Systems;
2accumulates security technologies;
3cryptographic algorithms to various problems;
4able to assess the reliability of information;
5can declare ways to protect information;
6analyzes traditional symmetric cryptosystems;
7Pon uses structural and functional features of
8Pon shows the difference between Block 8 and route displacements;
9classifies public key cryptosystems;
10can highlight the main functions of an electronic digital signature
Haftalık KonuEvaluation Method
1Fundamentals of Information Security General schemes of the process of ensuring security, technologies
2Fundamentals of cryptography. Simple displacement and displacement. 'Scitala' substitution method encryption tables.
3Application of the magic square (Magic Square) method
4Simple substitution cipher. Polybian square method
5Caesar encryption system. Caesar substitution affine system
6Trisemus encryption table.Playfair's bigram cipher
7Encryption methods with different substitutions. Route, block, vertical displacements
8Cardano cryptographic encryption system, Simple replacement and Cardano grids
9Gronsfeld cipher. Wijiner encryption system
10Wheatstone's' double square ' cipher for double placement
11Shannon-Fano methodology. Huffman cryptographic encryption algorithm
12The concept of public key cryptosystems. DES (Data Encryption Standard). AES( Advanced Encryption Standard)
13Public key cryptosystems. Encryption and decryption of information using the RSA cryptosystem
14Electronic digital signature technology. Authentication of documents.
15Electronic digital signature algorithm architecture. Key generation. Hash functions
Relationship between the Curriculum and Learning Outcomes
PÇ1PÇ2PÇ3PÇ4PÇ5PÇ6PÇ7PÇ8PÇ9PÇ10PÇ11PÇ12
Textbook / Material / Recommended Resources
1Information Security and Information Protection. Training manual [text] / K. S. Duisebekova. - Almaty: Kazakh University, 2013.
2the basis of Information Systems. Educational and methodical complex [text]. - Almaty: Nur-Print, 2013.
3applied cryptography.Training manual [text] / Musralieva Sh. zh. - A.: Kazakh University, 2013.
4fundamentals of cryptography [ text] / K. A. Abdykalikov. - Almaty: Polygrafcombinat LLP, 2012.
5the basis of Information Systems. Educational and methodical complex [text]. - Almaty: Nur-Print, 2012.