Faculty of Information Technology, BUT

Course details

Cryptography

KRY Acad. year 2019/2020 Summer semester 5 credits

Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security.

Guarantor

Deputy Guarantor

Language of instruction

Czech

Completion

Credit+Examination (written)

Time span

39 hrs lectures, 13 hrs projects

Assessment points

70 exam, 15 half-term test, 15 projects

Department

Lecturer

Instructor

Antal Lukáš, Ing. (DITS FIT BUT)
Aron Lukáš, Ing., Ph.D. (DITS FIT BUT)
Jurnečka Peter, Ing. (DITS FIT BUT)
Koranda Karel, Ing. (DITS FIT BUT)
Nagy Jan, Ing. (DITS FIT BUT)
Ovšonka Daniel, Ing. (DITS FIT BUT)
Schäfer Jiří, Ing. (DITS FIT BUT)
Zadina Martin, Ing. (DITS FIT BUT)

Subject specific learning outcomes and competences

Students will learn basic principles of applied cryptography, including classical cryptography and modern secret key and public key cryptography.

Generic learning outcomes and competences

Students will learn the role of security and functionality in information systems.

Learning objectives

The goal is to make students familiar with the basic concepts applied cryptography, including classical cryptography and modern secret key and public key cryptography.

Why is the course taught


This course is essential to all engineers working in the areas of computer engineering. Students will learn basic principles of information systems security and cryptography. 

Study literature

  • Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
  • Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
  • Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW

Fundamental literature

  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
  • Stallings, W.: Cryptography and Network Security, Pearson India, 2018, ISBN 9789332585225

Syllabus of lectures

  • Classical cryptography.
  • Modern cryptography, symmetric and asymmetric ciphers.
  • Symmetric ciphers. Key length, brute force attack.
  • Examples of symmetric ciphers. Feistel, DES, modes of operation.
  • Typical application of symmetric cryptography.
  • Asymmetric cryptography.
  • Electronic signature.
  • Examples of asymmetric ciphers, RSA.
  • DSS, function, attacks, optimization.
  • ElGamal, keyed hash, MAC.
  • Asymmetric cryptography application examples.
  • Key management for symmetric cryptography.
  • Key management for asymmetric cryptography, certificates, X.509.

Progress assessment

A mid-term exam evaluation and an evaluation of projects.

Controlled instruction

A written mid-term test, a regular evaluation of projects. The test does not have correction option, the final exam has two possible correction terms.

Exam prerequisites

To obtain at least one point in each project.

Schedule

DayTypeWeeksRoomStartEndLect.grpGroupsInfo
Monlecturelectures D0206 17:0019:50 1MIT 2MIT MBS xx

Course inclusion in study plans

Back to top