Course detail
Cryptography
FP-KIBAcad. year: 2022/2023
The course makes students familiar with basics of cryptology and information security, where the latter is covered in the areas of authentication, electronic signature, privacy. The opening of the course is dedicated to cryptology - its history, light mathematical background, block ciphers, random number generators, a couple of cryptanalysis examples. This is followed by authentication of data and users, authentication protocols. Next topis is a detailed overview of electronic signatures (archiving, time validity, signature creation/verification). The last large topis encounters privacy - definition of privacy, can it be measured, why it is becoming an issue. Final lectures go through a number of smaller areas. Secure devices, key management, and payment protocols.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
To obtain the credit student must obtain at least 60% of the possible points of written tests and written assignments on the condition that each project must obtain at least 50% of the possible points.
Course curriculum
2. Basics of cryptology, mathematical background
3. Cryptographic primitives - block ciphers, hash functions, random number generators
4. Cryptanalysis - demonstration on a couple of recent cryptanalytic attacks
5. Authentication protocols
6. User authentication
7. Electronic signature - using the signature, life-cycle
8. Electronic signature - electronic signature act
9. Privacy - introduction, importance for ubicomp
10. Anonymising, traffic analysis
11. Using pseudonyms
12. Secure devices, key management
13. Web Applications Security
Labs:
Seminars are focused on practicing the lectured topics and processing assignments. The aim is a practical introduction to the common security mechanisms.
Cryptanalysis.
Encrypted communication.
Web application security.
Work placements
Aims
The second goal is much more general survey of information secruity and familiarisation with hot issues. Students should be able to identify security requirements for information systems and have an idea about problems related to implementation of these requirements.
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Mel, H.X. Decrypted Cryptography (EN)
Recommended reading
Classification of course in study plans
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
Exercise
Teacher / Lecturer
Syllabus