Course detail

Cryptography

FEKT-MKRIAcad. year: 2017/2018

Basic terms, secrecy theory. Symmetric cryptosystems - stream ciphers, block ciphers, standards of symmetric ciphers, key management and distribution. Asymmetric cryptosystems - RSA, DL and EC types of cryptosystems, key agreement, standards of asymetric cryptosystems. Hash and other auxiliary cryptographic functions, data integrity, authentication, digital signatures. Public key infrastructure, modern cryptographic services. Quantum cryptography. Introduction to the cryptoanalysis, attacks on cryptosystems and their defence.

Language of instruction

Czech

Number of ECTS credits

6

Mode of study

Not applicable.

Learning outcomes of the course unit

Students will be introduced to applications of cryptographic mechanisms and methods in IT. They will learn the principles of information system security. On completion of the course, students will be able to explain the principles of modern symmetric and asymmetric cryptography.

Prerequisites

The subject knowledge on the Bachelor degree level is requested.

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Techning methods include lectures, computer laboratories and practical laboratories. Course is taking advantage of e-learning (Moodle) system. Teaching methods depend on the type of course unit as specified in article 7 of the BUT Rules for Studies and Examinations.

Assesment methods and criteria linked to learning outcomes

Evaluation of study results follows the Rules for Studies and Examinations of BUT and the Dean's Regulation complementing the Rules for Studies and Examinations of BUT.
Up to 30 points are given for work in laboratory.
Up to 70 points are given for the final examination.

Course curriculum

- Introduction to Cryptography, Classical cryptography.
- Modular Arithmetic.
- Symmetric Cryptography, Stream Ciphers.
- Symmetric Cryptography, Block Ciphers, DES, AES,...
- Public-Key Cryptography, RSA, D-H,...
- Elliptic Curve Cryptosystems.
- Hash Functions.
- Digital Signatures.
- PKI.
- Quantum Key Distribution.
- Side Channel Analysis.
- E-banking.
- Security architecture for RM-OSI.

Work placements

Not applicable.

Aims

The objective of this course is to provide students with detailed theoretical and practical knowledge on which they are built modern cryptographic systems designed to protect information technology.

Specification of controlled education, way of implementation and compensation for absences

The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

Biggs, N.L.: Discrete Mathematics, Oxford Science Publications, 1999, ISBN 0198534272 (EN)
Cameron, P.J.: Sets, Logic and Categories, Springer-Verlag, 2000, ISBN 1852330562 (EN)
Lawrence C. Washington. Elliptic Curves: Number Theory and Cryptography, Chapman and Hall/CRC, 2008, ISBN 9781420071467 (EN)
Procházka, L.: Algebra, Academia, Praha, 1990 (CS)
Song Y. Yan. Computational Number Theory and Modern Cryptography, 2013, ISBN: 978-1-118-18858-3 (EN)
Wenbo Mao. Modern Cryptography: Theory and Practice, Prentice Hall PTR, 2003 , ISBN: 0-13-066943-1 (EN)

Recommended reading

Not applicable.

Classification of course in study plans

  • Programme IBEP-V Master's

    branch V-IBP , 1 year of study, summer semester, compulsory

  • Programme EEKR-M Master's

    branch M-TIT , 2 year of study, summer semester, elective specialised

  • Programme EEKR-CZV lifelong learning

    branch EE-FLE , 1 year of study, summer semester, elective specialised

Type of course unit

 

Lecture

26 hod., optionally

Teacher / Lecturer

Syllabus

Introduction to cryptology, substitution and transposition ciphers
Mathematical foundations of cryptology
Cryptographic algorithm types and modes
Secret key encryption, DES data encryption standard
Public key encryption, RSA system
Cryptographic keys and their management
Digital signatures, one-way hash functions
Basic cryptographic protocols and its building blocks
Special algorithms for protocols, identification schemes
Criteria for system security assessment, security implementation principles
Security of data in computer networks
E-commerce security, application of cryptography in electronic publishing
Legislative and ethical protection of data

Laboratory exercise

39 hod., compulsory

Teacher / Lecturer

Syllabus

Introduction. Information for students about the content of particular laboratory metering assignments, methods of presenting the metering results obtained, organization of work in the laboratory, review exercises and their impact on overall assessment. Safety at work in the laboratory.
Foundations of cryptology, cryptographic algorithm types and modes, digital signatures, basic cryptographic protocols and their building blocks, security of data in computer networks, Internet security.