Advanced Cryptology
Kód | Zakončení | Kredity | Rozsah | Jazyk výuky |
---|---|---|---|---|
MIE-KRY.16 | Z,ZK | 5 | 2P+2C | anglicky |
- Přednášející:
- Róbert Lórencz (gar.)
- Cvičící:
- Jiří Buček, Róbert Lórencz (gar.)
- Předmět zajišťuje:
- katedra informační bezpečnosti
- Anotace:
-
Students will learn the essentials of cryptanalysis and the mathematical principles of constructing symmetric and asymmetric ciphers. They will know the mathematical principles of random number generators. They will have an overview of cryptanalysis methods, elliptic curve cryptography and quantum cryptography, which they can apply to the integration of their own systems or to the creation of their own software solutions.
- Požadavky:
-
MIE-MKY, BIE-BEZ
- Osnova přednášek:
-
1. Mathematical fundamentals of cryptanalysis of cyphers.
2. Random number generators.
3. Symmetric cryptography (block and stream encryption).
4. Asymmetric cryptography.
5. Unidirectional functions, hash functions.
6. Implementation of individual protocols.
7. Linear cryptanalysis.
8. Differential cryptanalysis.
9. Algebraic cryptanalysis.
10. Eliptic curves and their properties.
11. [2] Algorithms and cryptosystems based on elliptic curves.
12. Quantum computing and cryptography.
- Osnova cvičení:
-
1. Mathematical fundamentals of cryptanalysis of cyphers.
2. Random number generators.
3. Symmetric cryptography (block and stream encryption).
4. Asymmetric cryptography.
5. Unidirectional functions, hash functions.
6. Implementation of individual protocols.
7. Linear cryptanalysis.
8. Differential cryptanalysis.
9. Algebraic cryptanalysis.
10. Eliptic curves and their properties.
11. [2] Algorithms and cryptosystems based on elliptic curves.
12. Quantum computing and cryptography.
- Cíle studia:
-
The goal of this module is to familiarize students with the basics of cryptanalysis and its use in the development of secure applications. Students will also know the latest security trends in the area of applied cryptography.
- Studijní materiály:
-
1. Menezes, A., Oorschot, P., Vanstone, S. ''Handbook of Applied Cryptography''. CRC Press, 1996. ISBN 0849385237.
2. Gregory, V., B., ''Algebraic Cryptanalysis'', Springer, 2009, ISBN: 978-0-387-88756-2.
3. Daemen, J.., Rijmen, V.: ''The Design of Rijndael: AES - The Advanced Encryption Standard'', Springer, 2002, ISBN: 3-540-42580-2.
4. Gruska, J., ''Quantum computing'', McGraw-Hill Companies, 1999, ISBN: 0-07-709503-0.
- Poznámka:
-
Information about the course and courseware are available at https://moodle-vyuka.cvut.cz/course/view.php?id=2244
- Další informace:
- https://moodle-vyuka.cvut.cz/course/view.php?id=2244
- Rozvrh na zimní semestr 2020/2021:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Po Út St Čt Pá - Rozvrh na letní semestr 2020/2021:
- Rozvrh není připraven
- Předmět je součástí následujících studijních plánů:
-
- Computer Security, Presented in English, Version 2016 až 2020 (povinný předmět oboru)
- Computer Systems and Networks, Presented in English, Version 2016 až 2020 (volitelný předmět)
- Design and Programming of Embedded Systems, in English, Version 2016 až 2020 (volitelný předmět)
- Specialization Software Engineering, in English, Version 2016 až 2020 (volitelný předmět)