KRY Acad. year 2022/2023 Summer semester 5 credits
Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security.
Language of instruction
- 39 hrs lectures
- 13 hrs projects
- 70 pts final exam (written part)
- 15 pts mid-term test (written part)
- 15 pts projects
Subject specific learning outcomes and competences
Students will learn basic principles of applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Students will learn the role of security and functionality in information systems.
The goal is to make students familiar with the basic concepts applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Why is the course taught
This course is essential to all engineers working in the areas of computer engineering. Students will learn basic principles of information systems security and cryptography.
- Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
- Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
- Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
- Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW
- Stallings, W.: Cryptography and Network Security, Pearson India, 2018, ISBN 9789332585225
Syllabus of lectures
- Classical cryptography.
- Modern cryptography, symmetric and asymmetric ciphers.
- Symmetric ciphers. Key length, brute force attack.
- Examples of symmetric ciphers. Feistel, DES, modes of operation.
- Typical application of symmetric cryptography.
- Asymmetric cryptography.
- Electronic signature.
- Examples of asymmetric ciphers, RSA.
- DSS, function, attacks, optimization.
- ElGamal, keyed hash, MAC.
- Asymmetric cryptography application examples.
- Key management for symmetric cryptography.
- Key management for asymmetric cryptography, certificates, X.509.
A mid-term exam evaluation and an evaluation of projects.
A written mid-term test, a regular evaluation of projects. The test does not have correction option, the final exam has two possible correction terms.
To obtain at least one point in each project.
|Tue||lecture||lectures||G202||15:00||17:50||9999||1MIT 2MIT||NNET NSEC xx||Hanáček|
Course inclusion in study plans
- Programme IT-MGR-2, field MBI, any year of study, Compulsory-Elective group O
- Programme IT-MGR-2, field MBS, 2nd year of study, Compulsory
- Programme IT-MGR-2, field MGM, 2nd year of study, Elective
- Programme IT-MGR-2, field MIN, MPV, any year of study, Compulsory-Elective group C
- Programme IT-MGR-2, field MIS, 2nd year of study, Compulsory-Elective group S
- Programme IT-MGR-2, field MMM, any year of study, Compulsory-Elective group B
- Programme IT-MGR-2, field MSK, 1st year of study, Compulsory-Elective group B
- Programme MITAI, field NADE, NBIO, NCPS, NEMB, NEMB up to 2021/22, NGRI, NHPC, NIDE, NISD, NISY, NISY up to 2020/21, NMAL, NMAT, NSEN, NSPE, NVER, NVIZ, any year of study, Elective
- Programme MITAI, field NNET, NSEC, any year of study, Compulsory