Course detail

# Applied Cryptography

Basic terms, secrecy theory, perfect cipher. Symmetric cryptosystems - stream ciphers, block ciphers, standards of symmetric ciphers, key management and distribution. Asymmetric cryptosystems - RSA, DL and EC types of cryptosystems, key agreement, standards of asymetric cryptosystems. Hash and other auxiliary cryptographic functions, data integrity, authentication, digital signatures. Public key infrastructure, modern cryptographic services. Electronic voting, sharing of secret information. Quantum cryptography. Introduction to the cryptoanalysis, attacks on cryptosystems and their defence.

Language of instruction

English

Number of ECTS credits

4

Mode of study

Not applicable.

Výsledky učení předmětu

Students will obtain knowledge needed for the solution of cryptographic protection of communication, information and other electronic systems.

Prerekvizity

The subject knowledge on the Master´s degree level is requested.

Korekvizity

Not applicable.

Plánované vzdělávací činnosti a výukové metody

Techning methods include lectures. Course is taking advantage of e-learning system. Students have to write a single project during the course.

Způsob a kritéria hodnocení

The student will prepare a project on a given topic in the range of 8 to 10 standard pages. A written exam follows, in which the student demonstrates the knowledge of the studied issues.

Osnovy výuky

1. Secrecy theory and perfect cipher
2. Stream ciphers
3. Block ciphers
4. Block cipher standards and modes
5. Key management and distribution
6. Introduction to the modular mathematics
7. IF asymmetric cryptosystems
8. DL and EC asymmetric cryptosystems
9. Hash functions and digital signature
10. and 11. Applications of cryptography
12. Cryptography Perspectives
13. Reserve

Pracovní stáže

Not applicable.

Učební cíle

The goal is to become familiar with the principles of cryptography and cryptographic applications in communication, information and other electronic systems.

Vymezení kontrolované výuky a způsob jejího provádění a formy nahrazování zameškané výuky

The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.

Doporučené volitelné složky programu

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

Aumasson J.: Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, San Francisco, 2017. (EN)

Not applicable.

Classification of course in study plans

• Programme DPA-KAM Doctoral, any year of study, summer semester, compulsory-optional
• Programme DPA-EKT Doctoral, any year of study, summer semester, compulsory-optional
• Programme DPA-EIT Doctoral, any year of study, summer semester, compulsory-optional
• Programme DKA-EIT Doctoral, any year of study, summer semester, compulsory-optional
• Programme DPAD-EIT Doctoral, any year of study, summer semester, compulsory-optional
• Programme DPA-MET Doctoral, any year of study, summer semester, compulsory-optional
• Programme DPA-SEE Doctoral, any year of study, summer semester, compulsory-optional
• Programme DPA-TLI Doctoral, any year of study, summer semester, compulsory-optional
• Programme DPA-TEE Doctoral, any year of study, summer semester, compulsory-optional

#### Type of course unit

Seminar

39 hours, optionally

Teacher / Lecturer

Syllabus

see above