Course detail


FEKT-MKRIAcad. year: 2015/2016

Basic terms, secrecy theory. Symmetric cryptosystems - stream ciphers, block ciphers, standards of symmetric ciphers, key management and distribution. Asymmetric cryptosystems - RSA, DL and EC types of cryptosystems, key agreement, standards of asymetric cryptosystems. Hash and other auxiliary cryptographic functions, data integrity, authentication, digital signatures. Public key infrastructure, modern cryptographic services. Quantum cryptography. Introduction to the cryptoanalysis, attacks on cryptosystems and their defence.

Learning outcomes of the course unit

Students will be introduced to applications of cryptographic mechanisms in communications and networks. They will learn the basic principles of information system security. On completion of the course, students will be able to explain the principles of modern symmetric and asymmetric cryptography.


The subject knowledge on the Bachelor degree level is requested.


Not applicable.

Recommended optional programme components

Not applicable.

Recommended or required reading

Not applicable.

Planned learning activities and teaching methods

Techning methods include lectures, computer laboratories and practical laboratories. Course is taking advantage of e-learning (Moodle) system. Teaching methods depend on the type of course unit as specified in article 7 of the BUT Rules for Studies and Examinations.

Assesment methods and criteria linked to learning outcomes

Evaluation of study results follows the Rules for Studies and Examinations of BUT and the Dean's Regulation complementing the Rules for Studies and Examinations of BUT.
Up to 30 points are given for work in laboratory.
Up to 70 points are given for the final examination.

Language of instruction


Work placements

Not applicable.

Course curriculum

- Introduction to Cryptography, Classical cryptography.
- Modular Arithmetic.
- Symmetric Cryptography, Stream Ciphers.
- Symmetric Cryptography, Block Ciphers, DES, AES,...
- Public-Key Cryptography, RSA, D-H,...
- Elliptic Curve Cryptosystems.
- Hash Functions.
- Digital Signatures.
- PKI.
- Quantum Key Distribution.
- Side Channel Analysis.
- E-banking.
- Security architecture for RM-OSI.


The objective of this course is to provide fundamental theoretical knowledge of and practical skills in data protection and data security in modern communication and information systems.

Specification of controlled education, way of implementation and compensation for absences

The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.

Classification of course in study plans

  • Programme EEKR-M Master's

    branch M-TIT , 2. year of study, summer semester, 6 credits, optional specialized

  • Programme EEKR-M1 Master's

    branch M1-TIT , 2. year of study, summer semester, 6 credits, optional specialized

  • Programme EEKR-CZV lifelong learning

    branch ET-CZV , 1. year of study, summer semester, 6 credits, optional specialized

Type of course unit



26 hours, optionally

Teacher / Lecturer

Laboratory exercise

39 hours, compulsory

Teacher / Lecturer