Title:

Cryptography

Code:KRY
Ac.Year:2009/2010
Sem:Summer
Curriculums:
ProgrammeField/
Specialization
YearDuty
IT-MSC-2MBI1stCompulsory-Elective - group O
IT-MSC-2MBS2ndCompulsory
IT-MSC-2MGM2ndElective
IT-MSC-2MGM.2ndElective
IT-MSC-2MIN-Compulsory-Elective - group C
IT-MSC-2MIN.2ndCompulsory
IT-MSC-2MIS2ndCompulsory-Elective - group S
IT-MSC-2MIS.2ndElective
IT-MSC-2MMI1stCompulsory-Elective - group M
IT-MSC-2MMM2ndCompulsory-Elective - group B
IT-MSC-2MPS2ndElective
IT-MSC-2MPV1stCompulsory-Elective - group C
IT-MSC-2MSK1stCompulsory-Elective - group B
Language of Instruction:Czech
Public info:http://www.fit.vutbr.cz/study/courses/KRY/public/
Private info:http://www.fit.vutbr.cz/study/courses/KRY/private/
Credits:5
Completion:credit+exam (written)
Type of
instruction:
Hour/semLecturesSeminar
Exercises
Laboratory
Exercises
Computer
Exercises
Other
Hours:2600013
 ExamsTestsExercisesLaboratoriesOther
Points:70150015
Guarantor:Hanáček Petr, doc. Dr. Ing. (DITS)
Lecturer:Hanáček Petr, doc. Dr. Ing. (DITS)
Instructor:Jurnečka Peter, Ing. (DITS)
Nagy Jan, Ing. (DITS)
Schäfer Jiří, Ing. (DITS)
Zadina Martin, Ing. (DITS)
Faculty:Faculty of Information Technology BUT
Department:Department of Intelligent Systems FIT BUT
 
Learning objectives:
  The goal is to make students familiar with the basic concepts applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Description:
  Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security.
Subject specific learning outcomes and competencies:
  Students will learn basic principles of applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Generic learning outcomes and competencies:
  Students will learn the role of security and functionality in information systems.
Syllabus of lectures:
 
  • Classical cryptography.
  • Modern cryptography, symetric and asymetric ciphers.
  • Symetric ciphers. Key length, brute force attack.
  • Examples of symetric ciphers. Feistel, DES, modes of operation.
  • Typical application of symetric cryptography.
  • Asymetric cryptography.
  • Electronic signature.
  • Examples of asymteric ciphers, RSA.
  • DSS, function, attacks, optimization.
  • ElGamal, keyed hash, MAC.
  • Asymetric cryptography application examples.
  • Key management for symetric cryptography.
  • Key management for asymetric cryptography, certificates, X.509.
Syllabus of laboratory exercises:
 
  • Projects in the PC laboratory
Fundamental literature:
 
  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
  • Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0
Study literature:
 
  • Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
  • Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
  • Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW
Controlled instruction:
  A written mid-term test, a regular evaluation of projects.
Progress assessment:
  A mid-term exam evaluation and an evaluation of projects.
Exam prerequisites:
  To obtain at least one point in each project.
 

Your IPv4 address: 3.91.79.74
Switch to https

DNSSEC [dnssec]