Course detail
Cryptography
FIT-KRYAcad. year: 2020/2021
Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security.
Guarantor
Department
Learning outcomes of the course unit
Students will learn the role of security and functionality in information systems.
Prerequisites
Co-requisites
Recommended optional programme components
Literature
Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW
Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
Stallings, W.: Cryptography and Network Security, Pearson India, 2018, ISBN 9789332585225
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Exam prerequisites:
To obtain at least one point in each project.
Language of instruction
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Classification of course in study plans
- Programme IT-MGR-2 Master's
branch MBI , any year of study, summer semester, 5 credits, compulsory-optional
branch MPV , any year of study, summer semester, 5 credits, compulsory-optional
branch MIN , any year of study, summer semester, 5 credits, compulsory-optional
branch MMI , any year of study, summer semester, 5 credits, compulsory-optional
branch MMM , any year of study, summer semester, 5 credits, compulsory-optional - Programme MITAI Master's
specialization NADE , any year of study, summer semester, 5 credits, elective
specialization NBIO , any year of study, summer semester, 5 credits, elective
specialization NGRI , any year of study, summer semester, 5 credits, elective
specialization NNET , any year of study, summer semester, 5 credits, compulsory
specialization NVIZ , any year of study, summer semester, 5 credits, elective
specialization NCPS , any year of study, summer semester, 5 credits, elective
specialization NSEC , any year of study, summer semester, 5 credits, compulsory
specialization NEMB , any year of study, summer semester, 5 credits, elective
specialization NHPC , any year of study, summer semester, 5 credits, elective
specialization NISD , any year of study, summer semester, 5 credits, elective
specialization NIDE , any year of study, summer semester, 5 credits, elective
specialization NISY , any year of study, summer semester, 5 credits, elective
specialization NMAL , any year of study, summer semester, 5 credits, elective
specialization NMAT , any year of study, summer semester, 5 credits, elective
specialization NSEN , any year of study, summer semester, 5 credits, elective
specialization NVER , any year of study, summer semester, 5 credits, elective
specialization NSPE , any year of study, summer semester, 5 credits, elective - Programme IT-MGR-2 Master's
branch MSK , 1. year of study, summer semester, 5 credits, compulsory-optional
branch MGM , 2. year of study, summer semester, 5 credits, elective
branch MIS , 2. year of study, summer semester, 5 credits, compulsory-optional
branch MBS , 2. year of study, summer semester, 5 credits, compulsory
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
- Classical cryptography.
- Modern cryptography, symmetric and asymmetric ciphers.
- Symmetric ciphers. Key length, brute force attack.
- Examples of symmetric ciphers. Feistel, DES, modes of operation.
- Typical application of symmetric cryptography.
- Asymmetric cryptography.
- Electronic signature.
- Examples of asymmetric ciphers, RSA.
- DSS, function, attacks, optimization.
- ElGamal, keyed hash, MAC.
- Asymmetric cryptography application examples.
- Key management for symmetric cryptography.
- Key management for asymmetric cryptography, certificates, X.509.
Project
Teacher / Lecturer