Title:

Cryptography

Code:KRY
Ac.Year:2019/2020
Sem:Summer
Curriculums:
ProgrammeField/
Specialization
YearDuty
IT-MSC-2MBI-Compulsory-Elective - group O
IT-MSC-2MBS2ndCompulsory
IT-MSC-2MGM2ndElective
IT-MSC-2MIN-Compulsory-Elective - group C
IT-MSC-2MIS2ndCompulsory-Elective - group S
IT-MSC-2MMI-Compulsory-Elective - group M
IT-MSC-2MMM-Compulsory-Elective - group B
IT-MSC-2MPV-Compulsory-Elective - group C
IT-MSC-2MSK1stCompulsory-Elective - group B
MITAINADE-Elective
MITAINBIO-Elective
MITAINCPS-Elective
MITAINEMB-Elective
MITAINGRI-Elective
MITAINHPC-Elective
MITAINIDE-Elective
MITAINISD-Elective
MITAINISY-Elective
MITAINMAL-Elective
MITAINMAT-Elective
MITAINNET-Compulsory
MITAINSEC-Compulsory
MITAINSEN-Elective
MITAINSPE-Elective
MITAINVER-Elective
MITAINVIZ-Elective
Language of Instruction:Czech
Public info:http://www.fit.vutbr.cz/study/courses/KRY/public/
Private info:http://www.fit.vutbr.cz/study/courses/KRY/private/
Credits:5
Completion:credit+exam (written)
Type of
instruction:
Hour/semLecturesSeminar
Exercises
Laboratory
Exercises
Computer
Exercises
Other
Hours:3900013
 ExamsTestsExercisesLaboratoriesOther
Points:70150015
Guarantor:Hanáček Petr, doc. Dr. Ing. (DITS)
Deputy guarantor:Malinka Kamil, Mgr., Ph.D. (DITS)
Lecturer:Hanáček Petr, doc. Dr. Ing. (DITS)
Instructor:Antal Lukáš, Ing. (DITS)
Aron Lukáš, Ing., Ph.D. (DITS)
Jurnečka Peter, Ing. (DITS)
Koranda Karel, Ing. (DITS)
Nagy Jan, Ing. (DITS)
Ovšonka Daniel, Ing. (DITS)
Schäfer Jiří, Ing. (DITS)
Zadina Martin, Ing. (DITS)
Faculty:Faculty of Information Technology BUT
Department:Department of Intelligent Systems FIT BUT
Schedule:
DayLessonWeekRoomStartEndLect.Gr.Groups
MonlecturelecturesD0206 17:0019:501MIT 2MIT MBS xx
 
Learning objectives:
  The goal is to make students familiar with the basic concepts applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Description:
  Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security.
Subject specific learning outcomes and competencies:
  Students will learn basic principles of applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Generic learning outcomes and competencies:
  Students will learn the role of security and functionality in information systems.
Why is the course taught:
  
This course is essential to all engineers working in the areas of computer engineering. Students will learn basic principles of information systems security and cryptography. 
Syllabus of lectures:
 
  • Classical cryptography.
  • Modern cryptography, symmetric and asymmetric ciphers.
  • Symmetric ciphers. Key length, brute force attack.
  • Examples of symmetric ciphers. Feistel, DES, modes of operation.
  • Typical application of symmetric cryptography.
  • Asymmetric cryptography.
  • Electronic signature.
  • Examples of asymmetric ciphers, RSA.
  • DSS, function, attacks, optimization.
  • ElGamal, keyed hash, MAC.
  • Asymmetric cryptography application examples.
  • Key management for symmetric cryptography.
  • Key management for asymmetric cryptography, certificates, X.509.
Syllabus of laboratory exercises:
 
  • Projects in the PC laboratory
Fundamental literature:
 
  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
  • Stallings, W.: Cryptography and Network Security, Pearson India, 2018, ISBN 9789332585225
Study literature:
 
  • Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
  • Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
  • Nechvatal, J.: PUBLIC-KEY CRYPTOGRAPHY, NIST Special Publication 800-2, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
  • Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW
Controlled instruction:
  A written mid-term test, a regular evaluation of projects. The test does not have correction option, the final exam has two possible correction terms.
Progress assessment:
  A mid-term exam evaluation and an evaluation of projects.
Exam prerequisites:
  To obtain at least one point in each project.
 

Your IPv4 address: 54.211.135.32