Course detail
Cryptography
FEKT-MPC-KRYAcad. year: 2024/2025
Probability and information theory, Shannon's theory of secrecy. Computational complexity and number theory and its applications in cryptography. Turing machines and their variants, propositional logic, formal system of propositional logic, provability in propositional logic. Algebra and basic types, algebraic structures used in cryptography. Elliptic curve. Bilinear pairings and the use of cryptography, lattice, modern symmetric and asymmetric cryptographic systems. Quantum computational number theory, quantum resistant cryptography..
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Entry knowledge
Rules for evaluation and completion of the course
Up to 30 points are given for work in laboratory.
Up to 70 points are given for the final examination.
The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.
Aims
Students will be introduced to applications of cryptographic mechanisms and methods in IT. They will learn the principles of information system security. On completion of the course, students will be able to explain the principles of modern symmetric and asymmetric cryptography.
Study aids
Prerequisites and corequisites
Basic literature
Song Y. Yan. Computational Number Theory and Modern Cryptography, 2013, ISBN: 978-1-118-18858-3 (EN)
Recommended reading
Cameron, P.J. Sets, Logic and Categories, Springer-Verlag, 2000, ISBN 1852330562 (EN)
Lawrence C. Washington. Elliptic Curves: Number Theory and Cryptography, Chapman and Hall/CRC, 2008, ISBN 9781420071467 (EN)
Procházka, L. Algebra, Academia, Praha, 1990 (CS)
Elearning
Classification of course in study plans
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
Mathematical foundations of cryptology
Cryptographic algorithm types and modes
Secret key encryption, DES data encryption standard
Public key encryption, RSA system
Cryptographic keys and their management
Digital signatures, one-way hash functions
Basic cryptographic protocols and its building blocks
Special algorithms for protocols, identification schemes
Criteria for system security assessment, security implementation principles
Security of data in computer networks
E-commerce security, application of cryptography in electronic publishing
Legislative and ethical protection of data
Laboratory exercise
Teacher / Lecturer
Syllabus
Foundations of cryptology, cryptographic algorithm types and modes, digital signatures, basic cryptographic protocols and their building blocks, security of data in computer networks, Internet security.
Elearning