Course detail
Applied Cryptography
FEKT-DKA-TK2Acad. year: 2024/2025
Basic terms, secrecy theory, perfect cipher. Symmetric cryptosystems - stream ciphers, block ciphers, standards of symmetric ciphers, key management and distribution. Asymmetric cryptosystems - RSA, DL and EC types of cryptosystems, key agreement, standards of asymetric cryptosystems. Hash and other auxiliary cryptographic functions, data integrity, authentication, digital signatures. Public key infrastructure, modern cryptographic services. Electronic voting, sharing of secret information. Quantum cryptography. Introduction to the cryptoanalysis, attacks on cryptosystems and their defence.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Entry knowledge
Rules for evaluation and completion of the course
The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.
Aims
Students will obtain knowledge needed for the solution of cryptographic protection of communication, information and other electronic systems.
Study aids
Prerequisites and corequisites
Basic literature
Recommended reading
Classification of course in study plans
- Programme DKA-EIT Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DKA-EKT Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DKA-KAM Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DKA-MET Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DKA-SEE Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DKA-TEE Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DKA-TLI Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DKAD-EIT Doctoral 0 year of study, summer semester, compulsory-optional