Lecturer(s)
|
-
Oulehla Milan, Ing. Ph.D.
-
Jašek Roman, prof. Mgr. Ph.D., DBA
|
Course content
|
Topics: 1.Modern cryptology (division, classification, terminology) 2. Mathematical apparatus and methods used in modern cryptology (algebraic structures) 3.Symmetric cryptography (selected algorithms, applications) 4.Asymetric cryptography (selected algorithms, applications) 5. Elliptic curves over finite fields and their applications 6. Cryptographic protocols 7. Selected cryptographic techniques 8. Selected cryptographic algorithms 9.Application of hash algorithms, integrity security, Blockchain technology 10. Selected vulnerabilities and attacks on cryptography 11.Modern cryptanalysis (Brute force attack, complexity theory, rainbow tables) 12.Linear and multilinear cryptanalysis 13. Differential cryptanalysis and derived procedures 14. Quantum cryptology and resistance to quantum computers
|
Learning activities and teaching methods
|
Lecturing, Exercises on PC
- Educational trip
- 0 hours per semester
- Term paper
- 15 hours per semester
- Participation in classes
- 48 hours per semester
- Home preparation for classes
- 50 hours per semester
- Preparation for course credit
- 10 hours per semester
- Preparation for examination
- 10 hours per semester
|
prerequisite |
---|
Knowledge |
---|
Completed course Cryptology AUIUI / A3KRY. |
Completed course Cryptology AUIUI / A3KRY. |
learning outcomes |
---|
Describe the evolution of cryptology, including those areas that are now considered dangerous |
Describe the evolution of cryptology, including those areas that are now considered dangerous |
Explain the principles of the mathematical apparatus underlying modern encryption algorithms |
Explain the principles of the mathematical apparatus underlying modern encryption algorithms |
Describe practical computation over algebraic structures that are used in modern cryptology |
Describe practical computation over algebraic structures that are used in modern cryptology |
Describe the problem of generating truly random and pseudo-random numbers, including possible pitfalls |
Describe the problem of generating truly random and pseudo-random numbers, including possible pitfalls |
Explain the principle of operation of selected ciphers that are essential for current technical practice |
Explain the principle of operation of selected ciphers that are essential for current technical practice |
Skills |
---|
To competently select encryption algorithms that are optimal for a given area of cryptologic activity |
To competently select encryption algorithms that are optimal for a given area of cryptologic activity |
Determine safe practices regarding keys (generation, safe lengths, key holding, etc.) |
Determine safe practices regarding keys (generation, safe lengths, key holding, etc.) |
Compile security policies that relate to cryptology and that can be ingested in modern technical practice |
Compile security policies that relate to cryptology and that can be ingested in modern technical practice |
Identify serious security problems that can be caused by possible attacks of modern ciphers |
Identify serious security problems that can be caused by possible attacks of modern ciphers |
Identify common security issues related to improper implementation of encryption algorithms |
Identify common security issues related to improper implementation of encryption algorithms |
teaching methods |
---|
Knowledge |
---|
Exercises on PC |
Lecturing |
Lecturing |
Exercises on PC |
assessment methods |
---|
Didactic test |
Qualifying examination |
Didactic test |
Preparation of a presentation |
Preparation of a presentation |
Qualifying examination |
Recommended literature
|
-
HOLOŠKA, Jiří. Umělá inteligence aplikovaná na kryptoanalýzu zaměřená na odhalování slabostí moderní kryptologie a počítačové bezpečnosti. Zlín, 2012. ISBN 978-80-7454-144-5.
-
KOHNO, Tadayoshi, Niels FERGUSON a Bruce SCHNEIER. Cryptography engineering: design principles and practical applications. Indianapolis, 2010. ISBN 978-0470474242.
-
OULEHLA, Milan a Roman JAŠEK. Moderní kryptografie. Praha, 2017. ISBN 978-80-87383-67-4.
-
PAAR, Christof a Jan PELZL. Understanding Cryptography. New York, 2010. ISBN 3642041000.
-
PIPER, F. C. a Sean MURPHY. Kryptografie. Praha, 2006. ISBN 80-7363-074-5.
-
PŘIBYL, Jiří a Jindřich KODL. Ochrana dat v informatice. Praha, 1996. ISBN 80-01-01664-1.
-
SCHNEIER, Bruce. Applied cryptography: protocols, algorithms, and source code in C. Indianapolis, 2015. ISBN 978-1-119-09672-6.
|