Course detail

Applied Cryptography

FEKT-BPC-AKRAcad. year: 2025/2026

Basic terms, secrecy theory. Symmetric cryptosystems - stream ciphers, block ciphers, standards of symmetric ciphers, key management and distribution. Asymmetric cryptosystems - RSA, DL and EC types of cryptosystems, key agreement, standards of asymetric cryptosystems. Hash and other auxiliary cryptographic functions, data integrity, authentication, digital signatures. Public key infrastructure, modern cryptographic services. Quantum cryptography. Introduction to the cryptoanalysis, attacks on cryptosystems and their defence.

Language of instruction

Czech

Number of ECTS credits

7

Mode of study

Not applicable.

Entry knowledge

Basic knowledge of cryptography as provided in the compulsory subject Foundations of Cryptography.

Rules for evaluation and completion of the course

Evaluation of study results follows the Rules for Studies and Examinations of BUT and the Dean's Regulation complementing the Rules for Studies and Examinations of BUT.
The maximum of 25 points is given upon completion of the laboratory assignments.
The completion of an individual project adds upto 25 points.
The maximum of 50 points can be gained during the final exam.

The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.

Aims

The objective of this course is to provide fundamental theoretical knowledge of and practical skills in data protection and data security in modern communication and information systems.
Students will be introduced to applications of cryptographic mechanisms in communications and networks. They will learn the basic principles of information system security. On completion of the course, students will be able to explain the principles of modern symmetric and asymmetric cryptography.

Study aids

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

BURDA, K. Aplikovaná kryptografie. Brno: VUTIUM, 2013. 255 s. ISBN: 978-80-214-4612- 0.
LEVICKÝ, Dušan. Kryptografia v informačnej bezpečnosti. Košice: Elfa, 2005, 266 s. ISBN 80-808-6022-X.
Menezes, A. J., Oorschot, P. C., Vanstone, S. A.: Handbook of applied cryptography. CRC Press, Boca Raton1997. Dostupné online:
Paar, Ch., Pelzl, J.: Understanding Cryptography, Springer, 2010, ISBN 978-3-642-04100-6
Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0

Recommended reading

Not applicable.

Classification of course in study plans

  • Programme BPC-IBE Bachelor's 1 year of study, summer semester, compulsory

Type of course unit

 

Lecture

26 hod., optionally

Teacher / Lecturer

Syllabus

Úvod do kryptografie, klasická kryptografie.
Symetrická kryptografie, proudové šifr.
Symetrická kryptografie, blokové šifry, AES.
Kryptografie veřejného klíče, RSA, DL.
Kryptosystémy na bázi eliptických křivek.
Hašovací funkce.
Speciální algoritmy pro identifikační schémata.
Digitální podpis.
PKI.
Kvantová kryptografie.
Kryptoanalýza postranními kanály.
Bezpečnostní architektura RM OSI.
Praktické aplikace kryptografie.

Laboratory exercise

26 hod., compulsory

Teacher / Lecturer

Syllabus

Seznámení s laboratoří, bezpečnost.
CrypTool, úvod do kryptografie, klasické kryptografické systémy, kryptoanalýza.
Současné kryptografické systémy I.
Současné kryptografické systémy II.
Úvod do OS LINUX.
Vytvoření vlastní PKI.
Využití PKI ve webovém prostředí, max.
Analýza zabezpečených datových spojení sestavených pomocí PKI.
Šifrování v OS Windows.

Project

26 hod., compulsory

Teacher / Lecturer

Syllabus

Zpracování samostatného projektu v Python.