Subject description - AD7B32KBE

Summary of Study | Summary of Branches | All Subject Groups | All Subjects | List of Roles | Explanatory Notes               Instructions
AD7B32KBE Ciphers and Information Security
Roles:P Extent of teaching:14P + 6C
Department:13132 Language of teaching:CS
Guarantors:  Completion:Z,ZK
Lecturers:  Credits:6
Tutors:  Semester:L


The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned. The course also contains a primer of quantum cryptography and cryptonalysis.

Study targets:

Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.

Course outlines:

1. Modular arithmetic essentials, Number theory essentials, Fundamental theorem of arithmetic
2. Mathematical fundaments of cryptograhy, Substitution ciphers
3. Block, transposition and exponential ciphers, key exchange.
4. Information theory, Complexity theory
5. Hashing functions, MD5, SHA-x, HMAC
6. Chinese Remainder Theorem, Prime number tests, Stream ciphers, RC4
7. Stream ciphers, block ciphers, DES, 3DES, AES, cipher operating modes
8. Asymmetric cryptography 1
9. Asymmetric cryptography 2
10. Shared secret
11. Quantum cryptography introduction
12. Introduction to cryptanalysis
13. Elliptic curve cryptography
14. Reserved

Exercises outline:

1. Modular arithmetic essentials 1
2. Modular arithmetic essentials 2, substitution ciphers, affine ciphers
3. Block, transposition, Vigenere, and exponential ciphers.
4. Information theory, complexity theory. NTL C++ library.
5. Hashing functions in C/C++
6. Prime number tests, RC4 stream cipher
7. Operations in GF(2^8), homework assignments
8. Individual work
9. Individual work
10. Individual work
11. Asymmetric cryptograhy
12. SSL encryption, homework consultations and evaluation
13. Homework consultations and evaluation, credit
14. Reserved


Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, free download at Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1 Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4


Final exam grading is in part derived from the quality of presented homework and activity at seminars.



security, encryption, ciphers, cryptanalysis, hash, cryptographic algorithm, AES, IPsec, SSL, TLS, RSA, authentication, data integrity, MD5, SHA1, SHA2, EAP, 802.1x, WPA, WEP

Subject is included into these academic programs:

Program Branch Role Recommended semester
BIS(ECTS)-D Intelligent Systems P 4
BKSTMWM Web and Multimedia P 4
BKSTMSI Software Engineering P 4
BKSTMIS Intelligent Systems P 4
BSI(ECTS)-D Software Engineering P 4
BWM(ECTS)-D Web and Multimedia P 4
BMI(ECTS)-D Manager Informatics P 4
BKSTMMI Manager Informatics P 4

Page updated 27.10.2020 17:52:06, semester: Z,L/2020-1, L/2019-20, Z/2021-2, Send comments about the content to the Administrators of the Academic Programs Proposal and Realization: I. Halaška (K336), J. Novák (K336)