Course detail

Cryptography

FIT-KRYAcad. year: 2009/2010

Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security.

Language of instruction

Czech

Number of ECTS credits

5

Mode of study

Not applicable.

Learning outcomes of the course unit

Students will learn basic principles of applied cryptography, including classical cryptography and modern secret key and public key cryptography.

Students will learn the role of security and functionality in information systems.

Prerequisites

There are no prerequisites

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Not applicable.

Assesment methods and criteria linked to learning outcomes

Study evaluation is based on marks obtained for specified items. Minimimum number of marks to pass is 50.

Course curriculum

  • Classical cryptography.
  • Modern cryptography, symetric and asymetric ciphers.
  • Symetric ciphers. Key length, brute force attack.
  • Examples of symetric ciphers. Feistel, DES, modes of operation.
  • Typical application of symetric cryptography.
  • Asymetric cryptography.
  • Electronic signature.
  • Examples of asymteric ciphers, RSA.
  • DSS, function, attacks, optimization.
  • ElGamal, keyed hash, MAC.
  • Asymetric cryptography application examples.
  • Key management for symetric cryptography.
  • Key management for asymetric cryptography, certificates, X.509.

Work placements

Not applicable.

Aims

The goal is to make students familiar with the basic concepts applied cryptography, including classical cryptography and modern secret key and public key cryptography.

Specification of controlled education, way of implementation and compensation for absences

There are no checked study.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997. Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0

Recommended reading

Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3 Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW

Classification of course in study plans

  • Programme IT-MSC-2 Master's

    branch MBI , 1 year of study, summer semester, compulsory-optional
    branch MBS , 2 year of study, summer semester, compulsory
    branch MGM , 2 year of study, summer semester, elective
    branch MGM , 2 year of study, summer semester, elective
    branch MIN , 0 year of study, summer semester, compulsory-optional
    branch MIN , 2 year of study, summer semester, compulsory
    branch MIS , 2 year of study, summer semester, compulsory-optional
    branch MIS , 2 year of study, summer semester, elective
    branch MMI , 1 year of study, summer semester, compulsory-optional
    branch MMM , 2 year of study, summer semester, compulsory-optional
    branch MPS , 2 year of study, summer semester, elective
    branch MPV , 1 year of study, summer semester, compulsory-optional
    branch MSK , 1 year of study, summer semester, compulsory-optional

Type of course unit

 

Lecture

26 hod., optionally

Teacher / Lecturer

Syllabus

  • Classical cryptography.
  • Modern cryptography, symetric and asymetric ciphers.
  • Symetric ciphers. Key length, brute force attack.
  • Examples of symetric ciphers. Feistel, DES, modes of operation.
  • Typical application of symetric cryptography.
  • Asymetric cryptography.
  • Electronic signature.
  • Examples of asymteric ciphers, RSA.
  • DSS, function, attacks, optimization.
  • ElGamal, keyed hash, MAC.
  • Asymetric cryptography application examples.
  • Key management for symetric cryptography.
  • Key management for asymetric cryptography, certificates, X.509.

Project

13 hod., optionally

Teacher / Lecturer