Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2024/2025

Advanced Cryptology

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
NIE-KRY Z,ZK 5 2P+2C English
Course guarantor:
Róbert Lórencz
Lecturer:
Róbert Lórencz
Tutor:
Jiří Buček, Róbert Lórencz
Supervisor:
Department of Information Security
Synopsis:

Students will learn the essentials of cryptanalysis and the mathematical principles of constructing symmetric and asymmetric ciphers. They will know the mathematical principles of random number generators. They will have an overview of cryptanalysis methods, elliptic curve cryptography and quantum cryptography, which they can apply to the integration of their own systems or to the creation of their own software solutions.

Requirements:

The course does not require any entry knowledge.

Syllabus of lectures:

1. Mathematical fundamentals of cryptanalysis of cyphers.

2. Random number generators.

3. Symmetric cryptography (block and stream encryption).

4. Asymmetric cryptography.

5. Unidirectional functions, hash functions.

6. Implementation of individual protocols.

7. Linear cryptanalysis.

8. Differential cryptanalysis.

9. Algebraic cryptanalysis.

10. Eliptic curves and their properties.

11. [2] Algorithms and cryptosystems based on elliptic curves.

12. Quantum computing and cryptography.

Syllabus of tutorials:

1. Mathematical fundamentals of cryptanalysis of cyphers.

2. Random number generators.

3. Symmetric cryptography (block and stream encryption).

4. Asymmetric cryptography.

5. Unidirectional functions, hash functions.

6. Implementation of individual protocols.

7. Linear cryptanalysis.

8. Differential cryptanalysis.

9. Algebraic cryptanalysis.

10. Eliptic curves and their properties.

11. [2] Algorithms and cryptosystems based on elliptic curves.

12. Quantum computing and cryptography.

Study Objective:

The goal of this module is to familiarize students with the basics of cryptanalysis and its use in the development of secure applications. Students will also know the latest security trends in the area of applied cryptography.

Study materials:

1. Menezes, A., Oorschot, P., Vanstone, S. ''Handbook of Applied Cryptography''. CRC Press, 1996. ISBN 0849385237.

2. Gregory, V., B., ''Algebraic Cryptanalysis'', Springer, 2009, ISBN: 978-0-387-88756-2.

3. Daemen, J.., Rijmen, V.: ''The Design of Rijndael: AES - The Advanced Encryption Standard'', Springer, 2002, ISBN: 3-540-42580-2.

4. Gruska, J., ''Quantum computing'', McGraw-Hill Companies, 1999, ISBN: 0-07-709503-0.

Note:
Further information:
https://moodle-vyuka.cvut.cz/course/view.php?id=2242
Time-table for winter semester 2024/2025:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
roomTH:A-1142
Buček J.
09:15–10:45
(lecture parallel1
parallel nr.101)

Thákurova 7 (budova FSv)
Tue
Wed
roomTH:A-1122
Lórencz R.
12:45–14:15
(lecture parallel1)
Thákurova 7 (budova FSv)
Thu
Fri
Time-table for summer semester 2024/2025:
Time-table is not available yet
The course is a part of the following study plans:
Data valid to 2024-11-23
For updated information see http://bilakniha.cvut.cz/en/predmet6626006.html