Title:

# Cryptography

Code:KRY
Ac.Year:2008/2009
Sem:Summer
Curriculums:
ProgrammeField/
Specialization
YearDuty
IT-MSC-2MGM.2ndElective
IT-MSC-2MIN.2ndCompulsory
IT-MSC-2MIS.2ndElective
IT-MSC-2MPS2ndElective
Language of Instruction:Czech
Public info:http://www.fit.vutbr.cz/study/courses/KRY/public/
Private info:http://www.fit.vutbr.cz/study/courses/KRY/private/
Credits:5
Completion:examination (written)
Type of
instruction:
Hour/semLecturesSeminar
Exercises
Laboratory
Exercises
Computer
Exercises
Other
Hours:2600013
ExamsTestsExercisesLaboratoriesOther
Points:70150015
Guarantor:Hanáček Petr, doc. Dr. Ing. (DITS)
Lecturer:Hanáček Petr, doc. Dr. Ing. (DITS)
Instructor:Pecho Peter, Ing., Ph.D. (DITS)
Schäfer Jiří, Ing. (DITS)
Faculty:Faculty of Information Technology BUT
Department:Department of Intelligent Systems FIT BUT

Learning objectives:
The goal is to make students familiar with the basic concepts applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Description:
Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security.
Subject specific learning outcomes and competencies:
Students will learn basic principles of applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Generic learning outcomes and competencies:
Students will learn the role of security and functionality in information systems.
Syllabus of lectures:

• Classical cryptography.
• Modern cryptography, symetric and asymetric ciphers.
• Symetric ciphers. Key length, brute force attack.
• Examples of symetric ciphers. Feistel, DES, modes of operation.
• Typical application of symetric cryptography.
• Asymetric cryptography.
• Electronic signature.
• Examples of asymteric ciphers, RSA.
• DSS, function, attacks, optimization.
• ElGamal, keyed hash, MAC.
• Asymetric cryptography application examples.
• Key management for symetric cryptography.
• Key management for asymetric cryptography, certificates, X.509.
Syllabus of laboratory exercises:

• Projects in the PC laboratory
Fundamental literature:

• Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
• Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0
Study literature:

• Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
• Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
• Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
• Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW