Course detail

Applied cryptography

FEKT-DTK2Acad. year: 2017/2018

Basic terms, secrecy theory, perfect cipher. Symmetric cryptosystems - stream ciphers, block ciphers, standards of symmetric ciphers, key management and distribution. Asymmetric cryptosystems - RSA, DL and EC types of cryptosystems, key agreement, standards of asymetric cryptosystems. Hash and other auxiliary cryptographic functions, data integrity, authentication, digital signatures. Public key infrastructure, modern cryptographic services. Electronic voting, sharing of secret information. Quantum cryptography. Introduction to the cryptoanalysis, attacks on cryptosystems and their defence.

Language of instruction

Czech

Number of ECTS credits

4

Mode of study

Not applicable.

Learning outcomes of the course unit

Students will obtain knowledge needed for the solution of cryptographic protection of communication, information and other electronic systems.

Prerequisites

The subject knowledge on the Master´s degree level is requested.

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Techning methods include lectures. Course is taking advantage of e-learning system. Students have to write a single project during the course.

Assesment methods and criteria linked to learning outcomes

Requirements for completion of a course are specified by a regulation issued by the lecturer responsible for the course and updated for every.

Course curriculum

Not applicable.

Work placements

Not applicable.

Aims

The goal is to become familiar with the principles of cryptography and cryptographic applications in communication, information and other electronic systems.

Specification of controlled education, way of implementation and compensation for absences

The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

BURDA, K. Aplikovaná kryptografie. Brno: VUTIUM, 2013. 255 s. ISBN: 978-80-214-4612- 0.

Recommended reading

Menezes, A. J., Oorschot, P. C., Vanstone, S. A.: Handbook of applied cryptography. CRC Press, Boca Raton1997. Dostupné online:
Stallings, W.: Cryptography and network security. Pearson, Upper Saddle River 2006.

Classification of course in study plans

  • Programme EKT-PP Doctoral

    branch PP-BEB , 1 year of study, summer semester, elective specialised
    branch PP-EST , 1 year of study, summer semester, elective specialised
    branch PP-FEN , 1 year of study, summer semester, elective specialised
    branch PP-KAM , 1 year of study, summer semester, elective specialised
    branch PP-MET , 1 year of study, summer semester, elective specialised
    branch PP-MVE , 1 year of study, summer semester, elective specialised
    branch PP-SEE , 1 year of study, summer semester, elective specialised
    branch DP-TEE , 1 year of study, summer semester, elective specialised
    branch PP-TLI , 1 year of study, summer semester, elective specialised

  • Programme EKT-PK Doctoral

    branch PP-BEB , 1 year of study, summer semester, elective specialised
    branch PK-EST , 1 year of study, summer semester, elective specialised
    branch PK-FEN , 1 year of study, summer semester, elective specialised
    branch PK-KAM , 1 year of study, summer semester, elective specialised
    branch PK-MET , 1 year of study, summer semester, elective specialised
    branch PK-MVE , 1 year of study, summer semester, elective specialised
    branch PK-SEE , 1 year of study, summer semester, elective specialised
    branch PK-TEE , 1 year of study, summer semester, elective specialised
    branch PK-TLI , 1 year of study, summer semester, elective specialised

Type of course unit

 

Seminar

39 hod., optionally

Teacher / Lecturer

Syllabus

see above