Ciphers and Information Security

The course is not on the list Without time-table
Code Completion Credits Range Language
AD7B32KBE Z,ZK 6 14P + 6C Czech
Department of Telecommunications Engineering

The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned. The course also contains a primer of quantum cryptography and cryptonalysis.


Final exam grading is in part derived from the quality of presented homework and activity at seminars.

Syllabus of lectures:

1. Modular arithmetic essentials, Number theory essentials, Fundamental theorem of arithmetic

2. Mathematical fundaments of cryptograhy, Substitution ciphers

3. Block, transposition and exponential ciphers, key exchange.

4. Information theory, Complexity theory

5. Hashing functions, MD5, SHA-x, HMAC

6. Chinese Remainder Theorem, Prime number tests, Stream ciphers, RC4

7. Stream ciphers, block ciphers, DES, 3DES, AES, cipher operating modes

8. Asymmetric cryptography 1

9. Asymmetric cryptography 2

10. Shared secret

11. Quantum cryptography introduction

12. Introduction to cryptanalysis

13. Elliptic curve cryptography

14. Reserved

Syllabus of tutorials:

1. Modular arithmetic essentials 1

2. Modular arithmetic essentials 2, substitution ciphers, affine ciphers

3. Block, transposition, Vigenere, and exponential ciphers.

4. Information theory, complexity theory. NTL C++ library.

5. Hashing functions in C/C++

6. Prime number tests, RC4 stream cipher

7. Operations in GF(2^8), homework assignments

8. Individual work

9. Individual work

10. Individual work

11. Asymmetric cryptograhy

12. SSL encryption, homework consultations and evaluation

13. Homework consultations and evaluation, credit

14. Reserved

Study Objective:

Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.

Study materials:

Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, free download at http://www.cacr.math.uwaterloo.ca/hac/

Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1

Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4

Further information:
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2020-01-23
For updated information see http://bilakniha.cvut.cz/en/predmet1392806.html