Course detail

Cryptography

FEKT-NKRIAcad. year: 2010/2011

Security, security policy, security enforcement functions, security mechanisms, criteria for system security assessment. Mathematical foudations of cryptology. Substitution and transposition ciphers. Secret key encryption, AES data encryption standard, public key encryption, RSA system. Cryptographic keys and their management. Digital signatures, basic cryptographic protocols and their building blocks. Special algorithms for protocols, identification schemes. Security of data in computer networks. Internet and security, privacy protection. E-commerce security, application of cryptography in electronic publishing, legislative and ethical protection of data.

Language of instruction

English

Number of ECTS credits

6

Mode of study

Not applicable.

Learning outcomes of the course unit

Students will be introduced to applications of cryptographic mechanisms in communications and networks. They will learn the basic principles of information system security. They will also learn applied cryptography, including classical cryptography and modern secret key and public key cryptography.

Prerequisites

The subject knowledge on the Bachelor´s degree level is requested.

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Teaching methods depend on the type of course unit as specified in the article 7 of BUT Rules for Studies and Examinations.

Assesment methods and criteria linked to learning outcomes

Requirements for completion of a course are specified by a regulation issued by the lecturer responsible for the course and updated for every.

Course curriculum

Not applicable.

Work placements

Not applicable.

Aims

The objective of this subject is to provide fundamental theoretical knowledge of and practical skills in data protection and data security in modern communication and information systems.

Specification of controlled education, way of implementation and compensation for absences

The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
Přibyl, J.- Kodl, J.: Ochrana dat v informatice. Monografie ČVUT, Praha 1997
Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0

Recommended reading

Not applicable.

Classification of course in study plans

  • Programme EECC-MN Master's

    branch MN-TIT , 2 year of study, summer semester, elective specialised

Type of course unit

 

Lecture

39 hod., optionally

Teacher / Lecturer

Syllabus

Introduction to cryptology, substitution and transposition ciphers
Mathematical foundations of cryptology
Cryptographic algorithm types and modes
Secret key encryption, DES data encryption standard
Public key encryption, RSA system
Cryptographic keys and their management
Digital signatures, one-way hash functions
Basic cryptographic protocols and its building blocks
Special algorithms for protocols, identification schemes
Criteria for system security assessment, security implementation principles
Security of data in computer networks
E-commerce security, application of cryptography in electronic publishing
Legislative and ethical protection of data

Laboratory exercise

26 hod., compulsory

Teacher / Lecturer

Syllabus

Introduction
Mathematical foundations of cryptology
Cryptographic algorithm types and modes
Digital signatures
Basic cryptographic protocols and their building blocks
Security of data in computer networks, Internet security
Test
Working on individual project
Working on individual project
Working on individual project
Working on individual project
Working on individual project
Working on individual project