|
|
Main menu for Browse IS/STAG
Course info
KMI / KRY
:
Course description
Department/Unit / Abbreviation
|
KMI
/
KRY
|
Academic Year
|
2024/2025
|
Academic Year
|
2024/2025
|
Title
|
Cryptography
|
Form of course completion
|
Exam
|
Form of course completion
|
Exam
|
Accredited / Credits
|
Yes,
5
Cred.
|
Type of completion
|
Combined
|
Type of completion
|
Combined
|
Time requirements
|
Lecture
3
[Hours/Week]
Tutorial
1
[Hours/Week]
|
Course credit prior to examination
|
Yes
|
Course credit prior to examination
|
Yes
|
Automatic acceptance of credit before examination
|
No
|
Included in study average
|
YES
|
Language of instruction
|
Czech, English
|
Occ/max
|
|
|
|
Automatic acceptance of credit before examination
|
No
|
Summer semester
|
0 / -
|
0 / -
|
0 / -
|
Included in study average
|
YES
|
Winter semester
|
0 / -
|
0 / -
|
0 / 10
|
Repeated registration
|
NO
|
Repeated registration
|
NO
|
Timetable
|
Yes
|
Semester taught
|
Winter semester
|
Semester taught
|
Winter semester
|
Minimum (B + C) students
|
not determined
|
Optional course |
Yes
|
Optional course
|
Yes
|
Language of instruction
|
Czech, English
|
Internship duration
|
0
|
No. of hours of on-premise lessons |
|
Evaluation scale |
A|B|C|D|E|F |
Periodicity |
každý rok
|
Evaluation scale for credit before examination |
S|N |
Periodicita upřesnění |
|
Fundamental theoretical course |
Yes
|
Fundamental course |
Yes
|
Fundamental theoretical course |
Yes
|
Evaluation scale |
A|B|C|D|E|F |
Evaluation scale for credit before examination |
S|N |
Substituted course
|
None
|
Preclusive courses
|
N/A
|
Prerequisite courses
|
N/A
|
Informally recommended courses
|
N/A
|
Courses depending on this Course
|
N/A
|
Histogram of students' grades over the years:
Graphic PNG
,
XLS
|
Course objectives:
|
Students will learn about cryptography.
|
Requirements on student
|
Completion of assigned tasks. Passing an oral (or written) examination.
|
Content
|
1. History of cryptography.
2. Classical symmetric-key methods.
3. Cryptoanalysis of classical symmetric-key methods.
4. Perfect cryptography.
5. Theoretical aspects.
6. DES and AES.
7. Introduction to asymmetric-key methods.
8. Asymmetric-key method based on discreet logarithm.
9. Asymmetric-key method based on knapsack problem.
10. Asymmetric-key method based on elliptic curves.
11. RSA.
12. Cryptographic hash functions.
13. Digital signature.
14. Zero-knowledge proofs and other interesting topics.
|
Activities
|
|
Fields of study
|
|
Guarantors and lecturers
|
-
Guarantors:
doc. RNDr. Miroslav Kolařík, Ph.D. (100%),
-
Lecturer:
RNDr. Eduard Bartl, Ph.D. (100%),
Mgr. Radek Janoštík, Ph.D. (100%),
doc. RNDr. Miroslav Kolařík, Ph.D. (100%),
-
Tutorial lecturer:
RNDr. Eduard Bartl, Ph.D. (100%),
Mgr. Eliška Foltasová (100%),
Mgr. Radek Janoštík, Ph.D. (100%),
|
Literature
|
-
Basic:
Hoffstein J., Pipher J., Silverman J. H. An Introduction to Mathematical Cryptography. Springer, 2010.
-
Basic:
Stinson D. R. (2006). Cryptography : theory and practice. Chapman & Hall.
-
Basic:
Stinson D. R., Paterson M. B. Cryptography: theory and practice (4th edition). CRC Press, 2019.
-
Basic:
Paar C., Pelzl J. Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag, 2010.
-
Basic:
Paar C., Pelzl J. Understanding Cryptography: A Textbook for Students and Practitioners. Springer.
-
Recommended:
Schneider, Bruce. (1996). Applied Cryptography. John Wiley & Sons, Inc.
-
Recommended:
Song Y. Yan. (2013). Computational Number Theory and Modern Cryptography. Wiley.
-
Recommended:
Články vydané zejména v časopisu CHIP
(Klíma V.)
-
Recommended:
Menezes A. Handbook of Applied Cryptography. CRC Press.
-
Recommended:
Singh S. Kniha kódů a šifer. Dokořán, 2009.
-
Recommended:
Přibyl J., Kodl J. (1996). Ochana dat v informatice. Praha.
-
Recommended:
Knut D. E. The Art of Computer Programming: Seminumerical Algorithms (Volume II). Addison-Wesley, 1997.
-
On-line library catalogues
|
Prerequisites - other information about course preconditions |
- |
Competences acquired |
- |
Teaching methods |
|
Assessment methods |
|
|
|
|