Advanced Cryptology
Code  Completion  Credits  Range  Language 

MIKRY  Z,ZK  4  2+2  Czech 
 Lecturer:
 Tutor:
 Supervisor:
 Department of Information Security
 Synopsis:

Students will learn the essentials of cryptanalysis and the mathematical principles of constructing symmetric and asymmetric ciphers. They will know the mathematical principles of random number generators. They will have an overview of cryptanalysis methods, elliptic curve cryptography and quantum cryptography, which they can apply to the integration of their own systems or to the creation of their own software solutions.
 Requirements:
 Syllabus of lectures:

1. Mathematical fundamentals of cryptanalysis of cyphers.
2. Random number generators.
3. Symmetric cryptography (block and stream encryption).
4. Asymmetric cryptography.
5. Unidirectional functions, hash functions.
6. Implementation of individual protocols.
7. Linear cryptanalysis.
8. Differential cryptanalysis.
9. Algebraic cryptanalysis.
10. Eliptic curves and their properties.
11. [2] Algorithms and cryptosystems based on elliptic curves.
12. Quantum computing and cryptography.
 Syllabus of tutorials:

1. Mathematical fundamentals of cryptanalysis of cyphers.
2. Random number generators.
3. Symmetric cryptography (block and stream encryption).
4. Asymmetric cryptography.
5. Unidirectional functions, hash functions.
6. Implementation of individual protocols.
7. Linear cryptanalysis.
8. Differential cryptanalysis.
9. Algebraic cryptanalysis.
10. Eliptic curves and their properties.
11. [2] Algorithms and cryptosystems based on elliptic curves.
12. Quantum computing and cryptography.
 Study Objective:

The goal of this module is to familiarize students with the basics of cryptanalysis and its use in the development of secure applications. Students will also know the latest security trends in the area of applied cryptography.
 Study materials:

1. Menezes, A., Oorschot, P., Vanstone, S. ''Handbook of Applied Cryptography''. CRC Press, 1996. ISBN 0849385237.
2. Gregory, V., B., ''Algebraic Cryptanalysis'', Springer, 2009, ISBN: 9780387887562.
3. Daemen, J.., Rijmen, V.: ''The Design of Rijndael: AES  The Advanced Encryption Standard'', Springer, 2002, ISBN: 3540425802.
4. Gruska, J., ''Quantum computing'', McGrawHill Companies, 1999, ISBN: 0077095030.
 Note:
 Further information:
 No timetable has been prepared for this course
 The course is a part of the following study plans:

 Specialization System Programming, Presented in Czech, Version 2014, 2015 (elective course)
 Specialization Web Engineering, Presented in Czech, for Students who Enrolled in 2014 and 2015 (elective course)
 Knowledge Engineering, in Czech, Presented in Czech, for Students who Enrolled in 2015 (elective course)
 Master Informatics, Presented in Czech, Version for Students who Enrolled in 2015 (VO, elective course)
 Specialization Web and Software Engineering, in Czech, Version 2016, 2017 and 2018 (elective course)