Course detail
Applied Cryptography
FEKT-BPC-AKRAcad. year: 2020/2021
Basic terms, secrecy theory. Symmetric cryptosystems - stream ciphers, block ciphers, standards of symmetric ciphers, key management and distribution. Asymmetric cryptosystems - RSA, DL and EC types of cryptosystems, key agreement, standards of asymetric cryptosystems. Hash and other auxiliary cryptographic functions, data integrity, authentication, digital signatures. Public key infrastructure, modern cryptographic services. Quantum cryptography. Introduction to the cryptoanalysis, attacks on cryptosystems and their defence.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
The maximum of 20 points is given upon completion of the laboratory assignments.
The completion of an individual project adds upto 20 points.
The maximum of 60 points can be gained during the final exam.
Course curriculum
2. Symmetric Cryptography, Stream Ciphers.
3. Symmetric Cryptography, Block Ciphers, AES.
4. Public-Key Cryptography, RSA, DL.
5. Elliptic Curve Cryptosystems.
6. Hash Functions.
7. Special algorithms for identification schemes
8. Digital Signatures.
9. PKI.
10. Quantum Key Distribution.
11. Side Channel Analysis.
12. Security architecture for RM-OSI.
13. Practical applications of cryptography.
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
LEVICKÝ, Dušan. Kryptografia v informačnej bezpečnosti. Košice: Elfa, 2005, 266 s. ISBN 80-808-6022-X.
Menezes, A. J., Oorschot, P. C., Vanstone, S. A.: Handbook of applied cryptography. CRC Press, Boca Raton1997. Dostupné online:
Paar, Ch., Pelzl, J.: Understanding Cryptography, Springer, 2010, ISBN 978-3-642-04100-6
Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0
Recommended reading
Elearning
Classification of course in study plans
- Programme BPC-IBE Bachelor's 2 year of study, winter semester, compulsory
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
Symetrická kryptografie, proudové šifr.
Symetrická kryptografie, blokové šifry, AES.
Kryptografie veřejného klíče, RSA, DL.
Kryptosystémy na bázi eliptických křivek.
Hašovací funkce.
Speciální algoritmy pro identifikační schémata.
Digitální podpis.
PKI.
Kvantová kryptografie.
Kryptoanalýza postranními kanály.
Bezpečnostní architektura RM OSI.
Praktické aplikace kryptografie.
Laboratory exercise
Teacher / Lecturer
Syllabus
CrypTool, úvod do kryptografie, klasické kryptografické systémy, kryptoanalýza.
Současné kryptografické systémy I.
Současné kryptografické systémy II.
Úvod do OS LINUX.
Vytvoření vlastní PKI.
Využití PKI ve webovém prostředí, max.
Analýza zabezpečených datových spojení sestavených pomocí PKI.
Šifrování v OS Windows.
Project
Teacher / Lecturer
Syllabus
Elearning