FP-MkibKAcad. year: 2020/2021
The course makes students familiar with basics of cryptology and information security, where the latter is covered in the areas of authentication, electronic signature, privacy. The opening of the course is dedicated to cryptology - its history, light mathematical background, block ciphers, random number generators, a couple of cryptanalysis examples. This is followed by authentication of data and users, authentication protocols. Next topis is a detailed overview of electronic signatures (archiving, time validity, signature creation/verification). The last large topis encounters privacy - definition of privacy, can it be measured, why it is becoming an issue. Final lectures go through a number of smaller areas. Secure devices, key management, and payment protocols.
Learning outcomes of the course unit
Passing this course, students will know basic notions in the area of cryptography and security, privacy, and also gain knowledge about actual issues in the area of information system security. They should be able to identify/analyse crucial issues of a given information system.
There are no particular prerequisites required. Nevertheless, knowledge of English is an advantage.
Recommended optional programme components
Recommended or required reading
Anderson, R. Security Engineering (EN)
Mel, H.X. Decrypted Cryptography (EN)
Planned learning activities and teaching methods
The course contains lectures that explain basic principles, problems and methodology of the discipline, and exercises that promote the practical knowledge of the subject presented in the lectures.
Assesment methods and criteria linked to learning outcomes
The classification is based on written half-term test (30 %), written assignments (20 %) and final exam (50 %).
To obtain the credit student must obtain at least 50% of the possible points of written half-term and written assignments on the condition that each project must obtain at least 50% of the possible points.
Language of instruction
2. Basics of cryptology, mathematical background
3. Cryptographic primitives - block ciphers, hash functions, random number generators
4. Cryptanalysis - demonstration on a couple of recent cryptanalytic attacks
5. Authentication protocols
6. User authentication
7. Electronic signature - using the signature, life-cycle
8. Electronic signature - electronic signature act
10. Anonymising, traffic analysis
11. Using pseudonyms
12. Secure devices, key management
13. Web Applications Security
There are two basic goals of the course. The first one is to introduce students with modern cryptology. What are the limits of cryptanalysis, what algorithms are being used, basic errors that should be avoided and,of course, where can be cryptography applied.
The second goal is much more general survey of information secruity and familiarisation with hot issues. Students should be able to identify security requirements for information systems and have an idea about problems related to implementation of these requirements.
Specification of controlled education, way of implementation and compensation for absences
Students workout seminar assignments during the term and there is also a half-term exam. Students must obtain at least 50% of the maximum number of points to be allowed for the final exam. To obtain the credit student must obtain at least 50% of the possible points of written half-term and written assignments on the condition that each project must obtain at least 50% of the possible points.
Type of course unit
Guided consultation in combined form of studies
16 hours, optionally
Teacher / Lecturer