Title:

Cryptography

Code:KRY
Ac.Year:2013/2014
Sem:Summer
Curriculums:
ProgrammeFieldYearDuty
IT-MSC-2MBI-Compulsory-Elective - group O
IT-MSC-2MBS2ndCompulsory
IT-MSC-2MGM2ndElective
IT-MSC-2MIN-Compulsory-Elective - group C
IT-MSC-2MIS2ndCompulsory-Elective - group S
IT-MSC-2MMI-Compulsory-Elective - group M
IT-MSC-2MMM-Compulsory-Elective - group B
IT-MSC-2MPV1stCompulsory-Elective - group C
IT-MSC-2MSK1stCompulsory-Elective - group B
Language of Instruction:Czech
Public info:http://www.fit.vutbr.cz/study/courses/KRY/public/
Private info:http://www.fit.vutbr.cz/study/courses/KRY/private/
Credits:5
Completion:credit+exam (written)
Type of
instruction:
Hour/semLecturesSeminar
Exercises
Laboratory
Exercises
Computer
Exercises
Other
Hours:2600013
 ExamsTestsExercisesLaboratoriesOther
Points:70150015
Guarantor:Hanáček Petr, doc. Dr. Ing. (DITS)
Lecturer:Hanáček Petr, doc. Dr. Ing. (DITS)
Instructor:Aron Lukáš, Ing., Ph.D. (DITS)
Kačic Matej, Ing., Ph.D. (DITS)
Koranda Karel, Ing. (DITS)
Ovšonka Daniel, Ing. (DITS)
Faculty:Faculty of Information Technology BUT
Department:Department of Intelligent Systems FIT BUT
 
Learning objectives:
  The goal is to make students familiar with the basic concepts applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Description:
  Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security.
Subject specific learning outcomes and competencies:
  Students will learn basic principles of applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Generic learning outcomes and competencies:
  Students will learn the role of security and functionality in information systems.
Syllabus of lectures:
 
  • Classical cryptography.
  • Modern cryptography, symmetric and asymmetric ciphers.
  • Symmetric ciphers. Key length, brute force attack.
  • Examples of symmetric ciphers. Feistel, DES, modes of operation.
  • Typical application of symmetric cryptography.
  • Asymmetric cryptography.
  • Electronic signature.
  • Examples of asymmetric ciphers, RSA.
  • DSS, function, attacks, optimization.
  • ElGamal, keyed hash, MAC.
  • Asymmetric cryptography application examples.
  • Key management for symmetric cryptography.
  • Key management for asymmetric cryptography, certificates, X.509.
Syllabus of laboratory exercises:
 
  • Projects in the PC laboratory
Fundamental literature:
 
  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
  • Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0
Study literature:
 
  • Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
  • Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
  • Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW
Controlled instruction:
  A written mid-term exam, a regular evaluation of projects.
Progress assessment:
  A mid-term exam evaluation and an evaluation of projects.
Exam prerequisites:
  To obtain at least one point in each project.
 

Your IPv4 address: 3.84.243.246
Switch to https

DNSSEC [dnssec]