Title:

Cryptography

Code:KRY
Ac.Year:2018/2019
Sem:Summer
Curriculums:
ProgrammeField/
Specialization
YearDuty
IT-MSC-2MBI-Compulsory-Elective - group O
IT-MSC-2MBS2ndCompulsory
IT-MSC-2MGM2ndElective
IT-MSC-2MIN-Compulsory-Elective - group C
IT-MSC-2MIS2ndCompulsory-Elective - group S
IT-MSC-2MMI-Compulsory-Elective - group M
IT-MSC-2MMM-Compulsory-Elective - group B
IT-MSC-2MPV-Compulsory-Elective - group C
IT-MSC-2MSK1stCompulsory-Elective - group B
Language of Instruction:Czech
Public info:http://www.fit.vutbr.cz/study/courses/KRY/public/
Private info:http://www.fit.vutbr.cz/study/courses/KRY/private/
Credits:5
Completion:credit+exam (written)
Type of
instruction:
Hour/semLecturesSeminar
Exercises
Laboratory
Exercises
Computer
Exercises
Other
Hours:3900013
 ExamsTestsExercisesLaboratoriesOther
Points:70150015
Guarantor:Hanáček Petr, doc. Dr. Ing. (DITS)
Lecturer:Hanáček Petr, doc. Dr. Ing. (DITS)
Instructor:Hellebrandt Lukáš, Ing. (DITS)
Hujňák Ondřej, Ing. (DITS)
Mazura František, Ing. (DITS)
Očenáš Martin, Ing. (DITS)
Faculty:Faculty of Information Technology BUT
Department:Department of Intelligent Systems FIT BUT
Schedule:
DayLessonWeekRoomStartEndLect.Gr.Groups
Tueexam - řádná2019-05-14D105 16:0017:501MIT 2MIT
Tueexam - 1. oprava2019-05-21E105 16:0017:501MIT 2MIT
Friexam - 2. oprava2019-05-31E104 11:0012:501MIT 2MIT
 
Learning objectives:
  The goal is to make students familiar with the basic concepts applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Description:
  Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security.
Subject specific learning outcomes and competencies:
  Students will learn basic principles of applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Generic learning outcomes and competencies:
  Students will learn the role of security and functionality in information systems.
Syllabus of lectures:
 
  • Classical cryptography.
  • Modern cryptography, symmetric and asymmetric ciphers.
  • Symmetric ciphers. Key length, brute force attack.
  • Examples of symmetric ciphers. Feistel, DES, modes of operation.
  • Typical application of symmetric cryptography.
  • Asymmetric cryptography.
  • Electronic signature.
  • Examples of asymmetric ciphers, RSA.
  • DSS, function, attacks, optimization.
  • ElGamal, keyed hash, MAC.
  • Asymmetric cryptography application examples.
  • Key management for symmetric cryptography.
  • Key management for asymmetric cryptography, certificates, X.509.
Syllabus of laboratory exercises:
 
  • Projects in the PC laboratory
Fundamental literature:
 
  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
  • Stallings, W.: Cryptography and Network Security, Pearson India, 2018, ISBN 9789332585225
Study literature:
 
  • Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
  • Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
  • Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW
Controlled instruction:
  A written mid-term test, a regular evaluation of projects. The test does not have correction option, the final exam has two possible correction terms.
Progress assessment:
  A mid-term exam evaluation and an evaluation of projects.
Exam prerequisites:
  To obtain at least one point in each project.
 

Your IPv4 address: 54.221.145.174
Switch to https