Course detail

Applied Cryptography

FEKT-DPA-TK2Acad. year: 2020/2021

Basic terms, secrecy theory, perfect cipher. Symmetric cryptosystems - stream ciphers, block ciphers, standards of symmetric ciphers, key management and distribution. Asymmetric cryptosystems - RSA, DL and EC types of cryptosystems, key agreement, standards of asymetric cryptosystems. Hash and other auxiliary cryptographic functions, data integrity, authentication, digital signatures. Public key infrastructure, modern cryptographic services. Electronic voting, sharing of secret information. Quantum cryptography. Introduction to the cryptoanalysis, attacks on cryptosystems and their defence.

Language of instruction

English

Number of ECTS credits

4

Mode of study

Not applicable.

Learning outcomes of the course unit

Students will obtain knowledge needed for the solution of cryptographic protection of communication, information and other electronic systems.

Prerequisites

The subject knowledge on the Master´s degree level is requested.

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Techning methods include lectures. Course is taking advantage of e-learning system. Students have to write a single project during the course.

Assesment methods and criteria linked to learning outcomes

The student will prepare a project on a given topic in the range of 8 to 10 standard pages. A written exam follows, in which the student demonstrates the knowledge of the studied issues.

Course curriculum

1. Secrecy theory and perfect cipher
2. Stream ciphers
3. Block ciphers
4. Block cipher standards and modes
5. Key management and distribution
6. Introduction to the modular mathematics
7. IF asymmetric cryptosystems
8. DL and EC asymmetric cryptosystems
9. Hash functions and digital signature
10. and 11. Applications of cryptography
12. Cryptography Perspectives
13. Reserve

Work placements

Not applicable.

Aims

The goal is to become familiar with the principles of cryptography and cryptographic applications in communication, information and other electronic systems.

Specification of controlled education, way of implementation and compensation for absences

The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

Aumasson J.: Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, San Francisco, 2017. (EN)

Recommended reading

Not applicable.

Classification of course in study plans

  • Programme DPA-EKT Doctoral 0 year of study, summer semester, compulsory-optional
  • Programme DPA-KAM Doctoral 0 year of study, summer semester, compulsory-optional
  • Programme DPA-MET Doctoral 0 year of study, summer semester, compulsory-optional
  • Programme DPA-SEE Doctoral 0 year of study, summer semester, compulsory-optional
  • Programme DPA-TLI Doctoral 0 year of study, summer semester, compulsory-optional
  • Programme DPA-TEE Doctoral 0 year of study, summer semester, compulsory-optional
  • Programme DPA-EIT Doctoral 0 year of study, summer semester, compulsory-optional
  • Programme DPAD-EIT Doctoral 0 year of study, summer semester, compulsory-optional
  • Programme DKA-EIT Doctoral 0 year of study, summer semester, compulsory-optional

Type of course unit

 

Seminar

39 hod., optionally

Teacher / Lecturer

Syllabus

see above