Logo ČVUT
Loading...
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2011/2012

Applied Cryptography

The course is not on the list Without time-table
Code Completion Credits Range
XD36APK Z,ZK 4 14+6c
Lecturer:
Tutor:
Supervisor:
Department of Computer Science and Engineering
Synopsis:

The orientation of this course reflects the increasing importance of

information security. It starts with a basic theory and proceeds to

contemporary algorithms and applications of cryptography. The second part of

the course is devoted to cryptography protocols, aid computational tools,

special architectures for hardware implementation of cryptographic

algorithms and the primer of quantum cryptography. Some legislative and

standards aspects of cryptography are in conclusion introduced.

Requirements:

Final exam grading is in part derived from the quality of presented homework and activity at seminars.

Syllabus of lectures:

1. Information theory and complexity theory in cryptography

2. Cryptography services, overview of cryptography mechanisms

3. Mathematical primer of cryptography

4. Cryptographic algorithms

5. Symmetrical cryptography

6. Hashing functions

7. Asymmetric systems

8. Elliptic curves in asymmetric cryptography

9. Random number generators

10. Aid computational tools

11. Cryptography protocols

12. Special architectures for hardware implementation of cryptographic algorithms

13. Quantum cryptography - introduction

14. Legislative and standardisation aspects of cryptography

Syllabus of tutorials:

1. Introduction

2. Cryptographic mechanisms

3. Mathematical primer of cryptography

4. Cryptographic algorithms

5. Symmetrical cryptography

6. Hashing functions

7. Asymmetric systems

8. Elliptic curves in asymmetric cryptography

9. Assignment of individual projects

10. Random number generators, prime-number generators

11. Solution of individual projects, consultation

12. Solution of individual projects, consultation

13. Solution of individual projects, consultation, test

14. Presentation of individual projects

Study Objective:
Study materials:

1. Alfred J. Menezes Scott A. Vanstone Paul C. van Oorschot, Handbook of Applied Cryptography, CRC Press, 1996

2. Přibyl, J. - Kodl, J.: Ochrana dat v informatice. Praha, Vydavatelství ČVUT 1996

3. http://www.cacr.math.uwaterloo.ca/hac/

Note:
Further information:
No time-table has been prepared for this course
The course is a part of the following study plans:
Generated on 2012-7-9
For updated information see http://bilakniha.cvut.cz/en/predmet11663104.html