Course detail
Cryptography
FEKT-MKRIAcad. year: 2012/2013
Security, security policy, security enforcement functions, security mechanisms, criteria for system security assessment. Mathematical foudations of cryptology. Substitution and transposition ciphers. Secret key encryption, AES data encryption standard, public key encryption, RSA system. Cryptographic keys and their management. Digital signatures, basic cryptographic protocols and their building blocks. Special algorithms for protocols, identification schemes. Security of data in computer networks. Internet and security, privacy protection. E-commerce security, application of cryptography in electronic publishing, legislative and ethical protection of data.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Recommended reading
Classification of course in study plans
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
Mathematical foundations of cryptology
Cryptographic algorithm types and modes
Secret key encryption, DES data encryption standard
Public key encryption, RSA system
Cryptographic keys and their management
Digital signatures, one-way hash functions
Basic cryptographic protocols and its building blocks
Special algorithms for protocols, identification schemes
Criteria for system security assessment, security implementation principles
Security of data in computer networks
E-commerce security, application of cryptography in electronic publishing
Legislative and ethical protection of data
Laboratory exercise
Teacher / Lecturer
Syllabus
Foundations of cryptology, cryptographic algorithm types and modes, digital signatures, basic cryptographic protocols and their building blocks, security of data in computer networks, Internet security.