Summary of Study | Summary of Branches | All Subject Groups | All Subjects | List of Roles | Explanatory Notes               Instructions
Roles:P Extent of teaching:14P + 6C
Department:13132 Language of teaching:CS
Guarantors:  Completion:Z,ZK
Lecturers:  Credits:6
Tutors:  Semester:L

Anotation:

The orientation of this course reflects the increasing importance of information security. The course involves the essential mathematical theory and presents contemporary algorithms and applications of cryptography. Both symmetrical and asymmetrical cryptographic systems are mentioned. The course also contains a primer of quantum cryptography and cryptonalysis.

Study targets:

Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.

Course outlines:

 1 Modular arithmetic essentials, Number theory essentials, Fundamental theorem of arithmetic 2 Mathematical fundaments of cryptograhy, Substitution ciphers 3 Block, transposition and exponential ciphers, key exchange. 4 Information theory, Complexity theory 5 Hashing functions, MD5, SHA-x, HMAC 6 Chinese Remainder Theorem, Prime number tests, Stream ciphers, RC4 7 Stream ciphers, block ciphers, DES, 3DES, AES, cipher operating modes 8 Asymmetric cryptography 1 9 Asymmetric cryptography 2 10 Shared secret 11 Quantum cryptography introduction 12 Introduction to cryptanalysis 13 Elliptic curve cryptography 14 Reserved

Exercises outline:

 1 Modular arithmetic essentials 1 2 Modular arithmetic essentials 2, substitution ciphers, affine ciphers 3 Block, transposition, Vigenere, and exponential ciphers. 4 Information theory, complexity theory. NTL C++ library. 5 Hashing functions in C/C++ 6 Prime number tests, RC4 stream cipher 7 Operations in GF(2^8), homework assignments 8 Individual work 9 Individual work 10 Individual work 11 Asymmetric cryptograhy 12 SSL encryption, homework consultations and evaluation 13 Homework consultations and evaluation, credit 14 Reserved

Literature:

Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, free download at http://www.cacr.math.uwaterloo.ca/hac/ Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1 Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4

Requirements:

Final exam grading is in part derived from the quality of presented homework and activity at seminars.

Webpage:

https://moodle.fel.cvut.cz

Keywords:

security, encryption, ciphers, cryptanalysis, hash, cryptographic algorithm, AES, IPsec, SSL, TLS, RSA, authentication, data integrity, MD5, SHA1, SHA2, EAP, 802.1x, WPA, WEP

Subject is included into these academic programs:

 Program Branch Role Recommended semester BIS(ECTS)-D Intelligent Systems P 4 BKSTMWM Web and Multimedia P 4 BKSTMSI Software Engineering P 4 BKSTMIS Intelligent Systems P 4 BSI(ECTS)-D Software Engineering P 4 BWM(ECTS)-D Web and Multimedia P 4 BMI(ECTS)-D Manager Informatics P 4 BKSTMMI Manager Informatics P 4

 Page updated 27.10.2020 17:52:06, semester: Z,L/2020-1, L/2019-20, Z/2021-2, Send comments about the content to the Administrators of the Academic Programs Proposal and Realization: I. Halaška (K336), J. Novák (K336)