Title: | Cryptography |
---|
Code: | KRY |
---|
Ac.Year: | 2013/2014 |
---|
Sem: | Summer |
---|
Curriculums: | |
---|
Language of Instruction: | Czech |
---|
Public info: | http://www.fit.vutbr.cz/study/courses/KRY/public/ |
---|
Private info: | http://www.fit.vutbr.cz/study/courses/KRY/private/ |
---|
Credits: | 5 |
---|
Completion: | credit+exam (written) |
---|
Type of instruction: | Hour/sem | Lectures | Seminar Exercises | Laboratory Exercises | Computer Exercises | Other |
---|
Hours: | 26 | 0 | 0 | 0 | 13 |
---|
| Exams | Tests | Exercises | Laboratories | Other |
---|
Points: | 70 | 15 | 0 | 0 | 15 |
---|
|
---|
Guarantor: | Hanáček Petr, doc. Dr. Ing. (DITS) |
---|
Lecturer: | Hanáček Petr, doc. Dr. Ing. (DITS) |
Instructor: | Aron Lukáš, Ing., Ph.D. (DITS) Kačic Matej, Ing., Ph.D. (DITS) Koranda Karel, Ing. (DITS) Ovšonka Daniel, Ing. (DITS) |
---|
Faculty: | Faculty of Information Technology BUT |
---|
Department: | Department of Intelligent Systems FIT BUT |
---|
| Learning objectives: |
---|
| | The goal is to make students familiar with the basic concepts applied cryptography, including classical cryptography and modern secret key and public key cryptography. | Description: |
---|
| | Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security. | Subject specific learning outcomes and competencies: |
---|
| | Students will learn basic principles of applied cryptography, including classical cryptography and modern secret key and public key cryptography. | Generic learning outcomes and competencies: |
---|
| | Students will learn the role of security and functionality in information systems. | Syllabus of lectures: |
---|
|
- Classical cryptography.
- Modern cryptography, symmetric and asymmetric ciphers.
- Symmetric ciphers. Key length, brute force attack.
- Examples of symmetric ciphers. Feistel, DES, modes of operation.
- Typical application of symmetric cryptography.
- Asymmetric cryptography.
- Electronic signature.
- Examples of asymmetric ciphers, RSA.
- DSS, function, attacks, optimization.
- ElGamal, keyed hash, MAC.
- Asymmetric cryptography application examples.
- Key management for symmetric cryptography.
- Key management for asymmetric cryptography, certificates, X.509.
| Syllabus of laboratory exercises: |
---|
|
- Projects in the PC laboratory
| Fundamental literature: |
---|
|
- Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
- Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0
| Study literature: |
---|
|
- Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
- Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
- Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
- Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW
| Controlled instruction: |
---|
| | A written mid-term exam, a regular evaluation of projects. | Progress assessment: |
---|
| | A mid-term exam evaluation and an evaluation of projects. | Exam prerequisites: |
---|
| | To obtain at least one point in each project. | |
|