Course detail

Cryptography

FIT-KRYAcad. year: 2017/2018

Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security.

Learning outcomes of the course unit

Students will learn basic principles of applied cryptography, including classical cryptography and modern secret key and public key cryptography.

Students will learn the role of security and functionality in information systems.

Prerequisites

There are no prerequisites

Co-requisites

Not applicable.

Recommended optional programme components

Not applicable.

Recommended or required reading

  • Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
  • Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
  • Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW

  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
  • Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0

Planned learning activities and teaching methods

Not applicable.

Assesment methods and criteria linked to learning outcomes

To obtain at least one point in each project.

Language of instruction

Czech

Work placements

Not applicable.

Course curriculum

    Syllabus of lectures:
    • Classical cryptography.
    • Modern cryptography, symmetric and asymmetric ciphers.
    • Symmetric ciphers. Key length, brute force attack.
    • Examples of symmetric ciphers. Feistel, DES, modes of operation.
    • Typical application of symmetric cryptography.
    • Asymmetric cryptography.
    • Electronic signature.
    • Examples of asymmetric ciphers, RSA.
    • DSS, function, attacks, optimization.
    • ElGamal, keyed hash, MAC.
    • Asymmetric cryptography application examples.
    • Key management for symmetric cryptography.
    • Key management for asymmetric cryptography, certificates, X.509.

    Syllabus of laboratory exercises:
    • Projects in the PC laboratory

Aims

The goal is to make students familiar with the basic concepts applied cryptography, including classical cryptography and modern secret key and public key cryptography.

Specification of controlled education, way of implementation and compensation for absences

A written mid-term exam, a regular evaluation of projects.

Classification of course in study plans

  • Programme IT-MGR-2 Master's

    branch MBI , any year of study, summer semester, 5 credits, compulsory-optional
    branch MPV , any year of study, summer semester, 5 credits, compulsory-optional
    branch MIN , any year of study, summer semester, 5 credits, compulsory-optional
    branch MMI , any year of study, summer semester, 5 credits, compulsory-optional
    branch MMM , any year of study, summer semester, 5 credits, compulsory-optional
    branch MSK , 1. year of study, summer semester, 5 credits, compulsory-optional
    branch MGM , 2. year of study, summer semester, 5 credits, elective
    branch MIS , 2. year of study, summer semester, 5 credits, compulsory-optional
    branch MBS , 2. year of study, summer semester, 5 credits, compulsory

Type of course unit

 

Lecture

26 hours, optionally

Teacher / Lecturer

Syllabus


  • Classical cryptography.
  • Modern cryptography, symmetric and asymmetric ciphers.
  • Symmetric ciphers. Key length, brute force attack.
  • Examples of symmetric ciphers. Feistel, DES, modes of operation.
  • Typical application of symmetric cryptography.
  • Asymmetric cryptography.
  • Electronic signature.
  • Examples of asymmetric ciphers, RSA.
  • DSS, function, attacks, optimization.
  • ElGamal, keyed hash, MAC.
  • Asymmetric cryptography application examples.
  • Key management for symmetric cryptography.
  • Key management for asymmetric cryptography, certificates, X.509.

Project

13 hours, optionally

Teacher / Lecturer

eLearning