| 
        Lecturer(s)
     | 
    
        
            
                - 
                    Foltasová Eliška, Mgr.
                
 
            
                - 
                    Kolařík Miroslav, doc. RNDr. Ph.D.
                
 
            
                - 
                    Bartl Eduard, doc. RNDr. Ph.D.
                
 
            
                - 
                    Janoštík Radek, Mgr. Ph.D.
                
 
            
         
     | 
    | 
        Course content
     | 
    
        1. History of cryptography. 2. Classical symmetric-key methods. 3. Cryptoanalysis of classical symmetric-key methods. 4. Perfect cryptography. 5. Theoretical aspects. 6. DES and AES. 7. Introduction to asymmetric-key methods. 8. Asymmetric-key method based on discreet logarithm. 9. Asymmetric-key method based on knapsack problem. 10. Asymmetric-key method based on elliptic curves. 11. RSA. 12. Cryptographic hash functions. 13. Digital signature. 14. Zero-knowledge proofs and other interesting topics.
         
         
     | 
    | 
        Learning activities and teaching methods
     | 
    | 
        
        Lecture, Demonstration
        
        
     | 
    
    
        
        
            | 
                Learning outcomes
             | 
        
        
            
                
                Students will learn about cryptography.
                 
                
                 
                
             | 
        
        
            | 
                Prerequisites
             | 
        
        
            
                
                
                unspecified
                
                
                    
                        
                    
                    
                
                
  
             | 
        
        
            | 
                Assessment methods and criteria
             | 
        
        
            
                
                    
                        Oral exam, Written exam
                        
                        
                         
                        
                    
                    
                
                 Completion of assigned tasks. Passing an oral (or written) examination.
                 
             | 
        
    
    | 
        Recommended literature
     | 
    
        
            
                
                - 
                    Hoffstein J., Pipher J., Silverman J. H. (2010). An Introduction to Mathematical Cryptography. Springer. 
                
 
            
                
                - 
                    Knut D. E. (1997). The Art of Computer Programming: Seminumerical Algorithms (Volume II). Addison-Wesley. 
                
 
            
                
                - 
                    Menezes A. Handbook of Applied Cryptography. CRC Press. 
                
 
            
                
                - 
                    Paar C., Pelzl J. Understanding Cryptography: A Textbook for Students and Practitioners. Springer. 
                
 
            
                
                - 
                    Paar C., Pelzl J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag. 
                
 
            
                
                - 
                    Přibyl J., Kodl J. (1996). Ochana dat v informatice. Praha. 
                
 
            
                
                - 
                    Schneider, Bruce. (1996). Applied Cryptography. John Wiley & Sons, Inc. 
                
 
            
                
                - 
                    Singh S. (2009). Kniha kódů a šifer. Dokořán. 
                
 
            
                
                - 
                    Song Y. Yan. (2013). Computational Number Theory and Modern Cryptography. Wiley. 
                
 
            
                
                - 
                    Stinson D. R. (2006). Cryptography : theory and practice. Chapman & Hall. 
                
 
            
                
                - 
                    Stinson D. R., Paterson M. B. (2019). Cryptography: theory and practice (4th edition). CRC Press. 
                
 
            
         
         
         
     |