Applied Cryptography
Code | Completion | Credits | Range |
---|---|---|---|
XD36APK | Z,ZK | 4 | 14+6c |
- Lecturer:
- Tutor:
- Supervisor:
- Department of Computer Science and Engineering
- Synopsis:
-
The orientation of this course reflects the increasing importance of
information security. It starts with a basic theory and proceeds to
contemporary algorithms and applications of cryptography. The second part of
the course is devoted to cryptography protocols, aid computational tools,
special architectures for hardware implementation of cryptographic
algorithms and the primer of quantum cryptography. Some legislative and
standards aspects of cryptography are in conclusion introduced.
- Requirements:
-
Final exam grading is in part derived from the quality of presented homework and activity at seminars.
- Syllabus of lectures:
-
1. Information theory and complexity theory in cryptography
2. Cryptography services, overview of cryptography mechanisms
3. Mathematical primer of cryptography
4. Cryptographic algorithms
5. Symmetrical cryptography
6. Hashing functions
7. Asymmetric systems
8. Elliptic curves in asymmetric cryptography
9. Random number generators
10. Aid computational tools
11. Cryptography protocols
12. Special architectures for hardware implementation of cryptographic algorithms
13. Quantum cryptography - introduction
14. Legislative and standardisation aspects of cryptography
- Syllabus of tutorials:
-
1. Introduction
2. Cryptographic mechanisms
3. Mathematical primer of cryptography
4. Cryptographic algorithms
5. Symmetrical cryptography
6. Hashing functions
7. Asymmetric systems
8. Elliptic curves in asymmetric cryptography
9. Assignment of individual projects
10. Random number generators, prime-number generators
11. Solution of individual projects, consultation
12. Solution of individual projects, consultation
13. Solution of individual projects, consultation, test
14. Presentation of individual projects
- Study Objective:
- Study materials:
-
1. Alfred J. Menezes Scott A. Vanstone Paul C. van Oorschot, Handbook of Applied Cryptography, CRC Press, 1996
2. Přibyl, J. - Kodl, J.: Ochrana dat v informatice. Praha, Vydavatelství ČVUT 1996
- Note:
- Further information:
- No time-table has been prepared for this course
- The course is a part of the following study plans:
-
- Computer Technology- structured studies (compulsory elective course)