Course detail
Applied Cryptography
FEKT-DPA-TK2Acad. year: 2025/2026
Basic terms, secrecy theory, perfect cipher. Symmetric cryptosystems - stream ciphers, block ciphers, standards of symmetric ciphers, key management and distribution. Asymmetric cryptosystems - RSA, DL and EC types of cryptosystems, key agreement, standards of asymetric cryptosystems. Hash and other auxiliary cryptographic functions, data integrity, authentication, digital signatures. Public key infrastructure, modern cryptographic services. Electronic voting, sharing of secret information. Quantum cryptography. Introduction to the cryptoanalysis, attacks on cryptosystems and their defence.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Entry knowledge
Rules for evaluation and completion of the course
The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.
Aims
Students will obtain knowledge needed for the solution of cryptographic protection of communication, information and other electronic systems.
Study aids
Prerequisites and corequisites
Basic literature
Recommended reading
Classification of course in study plans
- Programme DPA-EIT Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DPA-EKT Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DPA-KAM Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DPA-MET Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DPA-SEE Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DPA-TEE Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DPA-TLI Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DPAD-EEC Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DPAD-EIT Doctoral 0 year of study, summer semester, compulsory-optional