Title:  Cryptography 

Code:  KRY 

Ac.Year:  2018/2019 

Sem:  Summer 

Curriculums:  

Language of Instruction:  Czech 

Public info:  http://www.fit.vutbr.cz/study/courses/KRY/public/ 

Private info:  http://www.fit.vutbr.cz/study/courses/KRY/private/ 

Credits:  5 

Completion:  credit+exam (written) 

Type of instruction:  Hour/sem  Lectures  Seminar Exercises  Laboratory Exercises  Computer Exercises  Other 

Hours:  39  0  0  0  13 

 Exams  Tests  Exercises  Laboratories  Other 

Points:  70  15  0  0  15 



Guarantor:  Hanáček Petr, doc. Dr. Ing. (DITS) 

Lecturer:  Hanáček Petr, doc. Dr. Ing. (DITS) 
Instructor:  Hellebrandt Lukáš, Ing. (DITS) Hujňák Ondřej, Ing. (DITS) Mazura František, Ing. (DITS) Očenáš Martin, Ing. (DITS) 

Faculty:  Faculty of Information Technology BUT 

Department:  Department of Intelligent Systems FIT BUT 

Schedule: 

Day  Lesson  Week  Room  Start  End  Lect.Gr.  Groups 

Tue  exam  řádná  20190514  D105  16:00  17:50  1MIT 2MIT  
Tue  exam  1. oprava  20190521  E105  16:00  17:50  1MIT 2MIT  
Fri  exam  2. oprava  20190531  E104  11:00  12:50  1MIT 2MIT  
  Learning objectives: 

  The goal is to make students familiar with the basic concepts applied cryptography, including classical cryptography and modern secret key and public key cryptography.  Description: 

  Introduction to cryptography, basic cryptographic algorithms, secret key encryption, public key encryption. Data transmission security.  Subject specific learning outcomes and competencies: 

  Students will learn basic principles of applied cryptography, including classical cryptography and modern secret key and public key cryptography.  Generic learning outcomes and competencies: 

  Students will learn the role of security and functionality in information systems.  Syllabus of lectures: 


 Classical cryptography.
 Modern cryptography, symmetric and asymmetric ciphers.
 Symmetric ciphers. Key length, brute force attack.
 Examples of symmetric ciphers. Feistel, DES, modes of operation.
 Typical application of symmetric cryptography.
 Asymmetric cryptography.
 Electronic signature.
 Examples of asymmetric ciphers, RSA.
 DSS, function, attacks, optimization.
 ElGamal, keyed hash, MAC.
 Asymmetric cryptography application examples.
 Key management for symmetric cryptography.
 Key management for asymmetric cryptography, certificates, X.509.
 Syllabus of laboratory exercises: 


 Projects in the PC laboratory
 Fundamental literature: 


 Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
 Stallings, W.: Cryptography and Network Security, Pearson India, 2018, ISBN 9789332585225
 Study literature: 


 Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN8023854003
 Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
 Nechvatal, J.: PUBLICKEY CRYPTOGRAPHY, NIST Special Publication 8002, National Institute of Standards and Technology, Gaithersburg, MD 20899, 1991, available on WWW
 Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997, available on WWW
 Controlled instruction: 

  A written midterm test, a regular evaluation of projects. The test does not have correction option, the final exam has two possible correction terms.  Progress assessment: 

  A midterm exam evaluation and an evaluation of projects.  Exam prerequisites: 

  To obtain at least one point in each project.  
