Course detail
Selected Topics in Coding
FSI-VKKAcad. year: 2015/2016
Course is focused on deepening the knowledge in theory and application methods of coding. Provided is basic mathematics necessary for understanding of presented codes. Discussed are modern methods of coding from areas of data compression, self correcting codes and cryptography. In the end of course is presented basic knowledge from area of emerging quantum cryptography. In course the students will elaborate two individual works - program applications. Practical examples are demonstrated in Matlab environment.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Learning outcomes of the course unit
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Morelos-Zaragoza, R. The Art of Error Correcting Coding. 2002. John Wiley & Sons Ltd., ISBN: 0-470-44782-4
Schneier, B. Applied cryptography : protocols, algorithms, and source code in C New York: Wiley, 1996, 0-471-12845-7
Recommended reading
Classification of course in study plans
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
2. Codes for data compression I. (modern lossless methods).
3. Codes for data compression II. (modern lossy methods, fractal compression).
4. Theory of linear codes I. (modular arithmetic, generating and control matrices, syndrome).
5. Theory of linear codes II. (polynomials, polynomial ring, roots, irreducibility).
6. Cyclic redundant codes (principle, coding, decoding).
7. Reed-Solomon codes (principle, coding, decoding).
8. Finite fields, properties, fields Z_p, discrete logarithm, Fermat's little theorem.
9. Symmetric block ciphers (Feistel cipher and DES, IDEA, AES). Operation modes EBC, CBC, OFB, CFB, CTR.
10. Asymmetric ciphers RSA and Elliptic curves. Selected factorization algorithms.
11. Principle of quantum cryptography.
12. Criteria, methodology and standards for evaluation of security.
13. HW implementation of codes.
Computer-assisted exercise
Teacher / Lecturer
Syllabus
a) Data formats,
b) data compression,
c) self repairing codes,
d) cryptography.