Semestr: Summer
Range: 14+6c
Completion:
Credits: 4
Programme type: Undefined
Study form: Parttime
Course language:
The orientation of this course reflects the increasing importance of information security. It starts with a basic theory and proceeds to contemporary algorithms and applications of cryptography. The second part of the course is devoted to cryptography protocols, aid computational tools, special architectures for hardware implementation of cryptographic algorithms and the primer of quantum cryptography. Some legislative and standards aspects of cryptography are in conclusion introduced.
Cryptography and theory of information, Cryptography systems, Modern trends in cryptography
1. Information theory and complexity theory in cryptography
2. Cryptography services, overview of cryptography mechanisms
3. Mathematical primer of cryptography
4. Cryptographic algorithms
5. Symmetrical cryptography
6. Hashing functions
7. Asymmetric systems
8. Elliptic curves in asymmetric cryptography
9. Random number generators
10. Aid computational tools
11. Cryptography protocols
12. Special architectures for hardware implementation of cryptographic algorithms
13. Quantum cryptography - introduction
14. Legislative and standardisation aspects of cryptography
1. Introduction
2. Cryptographic mechanisms
3. Mathematical primer of cryptography
4. Cryptographic algorithms
5. Symmetrical cryptography
6. Hashing functions
7. Asymmetric systems
8. Elliptic curves in asymmetric cryptography
9. Assignment of individual projects
10. Random number generators, prime-number generators
11. Solution of individual projects, consultation
12. Solution of individual projects, consultation
13. Solution of individual projects, consultation, test
14. Presentation of individual projects
1. Alfred J. Menezes Scott A. Vanstone Paul C. van Oorschot, Handbook of Applied Cryptography, CRC Press, 1996
2. Přibyl, J. - Kodl, J.: Ochrana dat v informatice. Praha, Vydavatelství ČVUT 1996
3. http://www.cacr.math.uwaterloo.ca/hac/