FEKT-TAKRCompulsoryBachelor's (1st cycle)Acad. year: 2015/2016Summer semester1. year of study7 credits
Basic terms, secrecy theory. Symmetric cryptosystems - stream ciphers, block ciphers, standards of symmetric ciphers, key management and distribution. Asymmetric cryptosystems - RSA, DL and EC types of cryptosystems, key agreement, standards of asymetric cryptosystems. Hash and other auxiliary cryptographic functions, data integrity, authentication, digital signatures. Public key infrastructure, modern cryptographic services. Quantum cryptography. Introduction to the cryptoanalysis, attacks on cryptosystems and their defence.
Learning outcomes of the course unit
Students will be introduced to applications of cryptographic mechanisms in communications and networks. They will learn the basic principles of information system security. On completion of the course, students will be able to explain the principles of modern symmetric and asymmetric cryptography.
Mode of delivery
90 % face-to-face, 10 % distance learning
Basic knowledge of cryptography as provided in the compulsory subject Foundations of Cryptography.
Recommended optional programme components
Recommended or required reading
Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0
Paar, Ch., Pelzl, J.: Understanding Cryptography, Springer, 2010, ISBN 978-3-642-04100-6
Menezes, A. J., Oorschot, P. C., Vanstone, S. A.: Handbook of applied cryptography. CRC Press, Boca Raton1997. Dostupné online:
BURDA, K. Aplikovaná kryptografie. Brno: VUTIUM, 2013. 255 s. ISBN: 978-80-214-4612- 0.
LEVICKÝ, Dušan. Kryptografia v informačnej bezpečnosti. Košice: Elfa, 2005, 266 s. ISBN 80-808-6022-X.
Planned learning activities and teaching methods
Techning methods include lectures, laboratories and student projects. Course is taking advantage of e-learning (Moodle) system. Teaching methods depend on the type of course unit as specified in article 7 of the BUT Rules for Studies and Examinations.
Assesment methods and criteria linked to learning outcomes
Evaluation of study results follows the Rules for Studies and Examinations of BUT and the Dean's Regulation complementing the Rules for Studies and Examinations of BUT.
The maximum of 25 points is given upon completion of the laboratory assignments.
The completion of an individual project adds upto 15 points.
The maximum of 60 points can be gained during the final exam.
Language of instruction
1. Introduction to Cryptography, Classical cryptography.
2. Symmetric Cryptography, Stream Ciphers.
3. Symmetric Cryptography, Block Ciphers, AES.
4. Public-Key Cryptography, RSA, DL.
5. Elliptic Curve Cryptosystems.
6. Hash Functions.
7. Special algorithms for identification schemes
8. Digital Signatures.
10. Quantum Key Distribution.
11. Side Channel Analysis.
12. Security architecture for RM-OSI.
13. Practical applications of cryptography.
The objective of this course is to provide fundamental theoretical knowledge of and practical skills in data protection and data security in modern communication and information systems.
Specification of controlled education, way of implementation and compensation for absences
The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.