Advanced Cryptology
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
NI-KRY | Z,ZK | 5 | 2P+2C | Czech |
- Course guarantor:
- Róbert Lórencz
- Lecturer:
- Róbert Lórencz
- Tutor:
- Jiří Buček, Róbert Lórencz
- Supervisor:
- Department of Information Security
- Synopsis:
-
Students will learn the essentials of cryptanalysis and the mathematical principles of constructing symmetric and asymmetric ciphers. They will know the mathematical principles of random number generators. They will have an overview of cryptanalysis methods, elliptic curve cryptography and quantum cryptography, which they can apply to the integration of their own systems or to the creation of their own software solutions.
- Requirements:
- Syllabus of lectures:
- Syllabus of tutorials:
-
1. Mathematical fundamentals of cryptanalysis of cyphers.
2. Random number generators.
3. Symmetric cryptography (block and stream encryption).
4. Asymmetric cryptography.
5. Unidirectional functions, hash functions.
6. Implementation of individual protocols.
7. Linear cryptanalysis.
8. Differential cryptanalysis.
9. Algebraic cryptanalysis.
10. Eliptic curves and their properties.
11. [2] Algorithms and cryptosystems based on elliptic curves.
12. Quantum computing and cryptography.
- Study Objective:
-
The goal of this module is to familiarize students with the basics of cryptanalysis and its use in the development of secure applications. Students will also know the latest security trends in the area of applied cryptography.
- Study materials:
-
1. Takagi, T. - Morozov, K. : Mathematics of Post-quantum Cryptography. Springer, 2020. ISBN 978-4-431- 55016-7.
2. Bhunia, S. - Tehranipoor, M. : Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann, 2018. ISBN 978-0128124772.
3. Bard, G. : Algebraic Cryptanalysis. Springer, 2009. ISBN 978-0-387-88756-2.
4. Daemen, J. - Rijmen, V. : The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, 2002. ISBN 3-540-42580-2.
5. Menezes, A. - Oorschot, P. - Vanstone, S. : Handbook of Applied Cryptography. CRC Press, 1996. ISBN 0849385237.
- Note:
- Further information:
- https://moodle-vyuka.cvut.cz/course/view.php?id=2242
- Time-table for winter semester 2024/2025:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon Tue Wed Thu Fri - Time-table for summer semester 2024/2025:
- Time-table is not available yet
- The course is a part of the following study plans:
-
- Master specialization Computer Security, in Czech, 2020 (PS)
- Master specialization Design and Programming of Embedded Systems, in Czech, 2020 (elective course)
- Master specialization Computer Systems and Networks, in Czech, 202 (elective course)
- Master specialization Management Informatics, in Czech, 2020 (elective course)
- Master specialization Software Engineering, in Czech, 2020 (elective course)
- Master specialization System Programming, in Czech, version from 2020 (elective course)
- Master specialization Web Engineering, in Czech, 2020 (elective course)
- Master specialization Knowledge Engineering, in Czech, 2020 (elective course)
- Master specialization Computer Science, in Czech, 2020 (elective course)
- Mgr. programme, for the phase of study without specialisation, ver. for 2020 and higher (VO)
- Master Specialization Digital Business Engineering, 2023 (VO)
- Master specialization System Programming, in Czech, version from 2023 (elective course)
- Master specialization Computer Science, in Czech, 2023 (elective course)