Course detail
Cryptography
FIT-KRYAcad. year: 2024/2025
Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Entry knowledge
Rules for evaluation and completion of the course
A mid-term exam evaluation and an evaluation of projects.
A written mid-term test, a regular evaluation of projects. The test does not have correction option, the final exam has two possible correction terms.
Aims
Students will learn basic principles of applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Students will learn the role of security and functionality in information systems.
Study aids
Prerequisites and corequisites
Basic literature
Recommended reading
Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW
Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
Stallings, W.: Cryptography and Network Security, Pearson India, 2018, ISBN 9789332585225
Elearning
Classification of course in study plans
- Programme MITAI Master's
specialization NGRI , 0 year of study, summer semester, elective
specialization NADE , 0 year of study, summer semester, elective
specialization NISD , 0 year of study, summer semester, elective
specialization NMAT , 0 year of study, summer semester, elective
specialization NSEC , 0 year of study, summer semester, compulsory
specialization NISY up to 2020/21 , 0 year of study, summer semester, elective
specialization NNET , 0 year of study, summer semester, compulsory
specialization NMAL , 0 year of study, summer semester, elective
specialization NCPS , 0 year of study, summer semester, elective
specialization NHPC , 0 year of study, summer semester, elective
specialization NVER , 0 year of study, summer semester, elective
specialization NIDE , 0 year of study, summer semester, elective
specialization NISY , 0 year of study, summer semester, elective
specialization NEMB , 0 year of study, summer semester, elective
specialization NSPE , 0 year of study, summer semester, elective
specialization NEMB , 0 year of study, summer semester, elective
specialization NBIO , 0 year of study, summer semester, elective
specialization NSEN , 0 year of study, summer semester, elective
specialization NVIZ , 0 year of study, summer semester, elective
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
- Classical cryptography.
- Modern cryptography, symmetric and asymmetric ciphers.
- Symmetric ciphers. Key length, brute force attack.
- Examples of symmetric ciphers. Feistel, DES, modes of operation.
- Typical application of symmetric cryptography.
- Asymmetric cryptography.
- Electronic signature.
- Examples of asymmetric ciphers, RSA.
- DSS, function, attacks, optimization.
- ElGamal, keyed hash, MAC.
- Asymmetric cryptography application examples.
- Key management for symmetric cryptography.
- Key management for asymmetric cryptography, certificates, X.509.
Elearning