Course: Cryptology

« Back
Course title Cryptology
Course code AUIUI/AE3KR
Organizational form of instruction Lecture + Lesson
Level of course Bachelor
Year of study not specified
Semester Winter
Number of ECTS credits 6
Language of instruction Czech, English
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Course availability The course is available to visiting students
Lecturer(s)
  • Žáček Petr, Ing. Ph.D.
  • Oulehla Milan, Ing. Ph.D.
  • Šenkeřík Roman, prof. Ing. Ph.D.
Course content
1. Basic concepts of cryptology, brief history, classifications, mathematical foundations, cryptographic rules. 2. Symmetric, asymmetric, and hybrid systems - principles. 3. Classical cryptology - substitution systems (monoalphabetic, polyalphabetic, and polygraphic ciphers). 4. Classical cryptology - transposition systems. 5. Introduction to modern cryptology, mathematical foundations of modern cryptology - complex modular arithmetic, discrete logarithm, factorization of primes. 6. One-way functions, principles and protocols of key exchange (Diffie Helman). 7. Stream ciphers. 8. Block ciphers. 9. Asymmetric systems with a public key. 10. Asymmetric systems with elliptic curves. 11. Cryptology based on chaos theory and quantum theory and other non-traditional modern cryptosystems. 12. Steganography. 13. Basic attacks on encryption systems, physical and practical assumptions. 14. Cryptanalysis

Learning activities and teaching methods
Lecturing, Exercises on PC
prerequisite
Knowledge
Knowledge from areas: Mathematics Fundamentals of Informatics Programming
Knowledge from areas: Mathematics Fundamentals of Informatics Programming
learning outcomes
The student can enumerate and define basic concepts of cryptology and describe its historical development and classifications.
The student can enumerate and define basic concepts of cryptology and describe its historical development and classifications.
The student understands the principles of symmetric, asymmetric, and hybrid cryptographic systems and can differentiate among them.
The student understands the principles of symmetric, asymmetric, and hybrid cryptographic systems and can differentiate among them.
The student has knowledge about classical substitution and transposition systems, including monoalphabetic, polyalphabetic, and polygraphic ciphers.
The student has knowledge about classical substitution and transposition systems, including monoalphabetic, polyalphabetic, and polygraphic ciphers.
The student can clarify the principles of modern cryptology, including one-way functions and key exchange principles.
The student can clarify the principles of modern cryptology, including one-way functions and key exchange principles.
The student understands the fundamentals of steganography and the applications of unconventional methods in cryptology and encryption.
The student understands the fundamentals of steganography and the applications of unconventional methods in cryptology and encryption.
Skills
The student can apply different encryption methods, including symmetric, asymmetric, and hybrid systems.
The student can apply different encryption methods, including symmetric, asymmetric, and hybrid systems.
The student is capable of implementing and using stream and block cipher algorithms in practical applications.
The student is capable of implementing and using stream and block cipher algorithms in practical applications.
The student can design systems for secure data transmission and verification using modern cryptographic principles.
The student can design systems for secure data transmission and verification using modern cryptographic principles.
The student has skills in detecting hidden information in multimedia data files using steganographic techniques.
The student has skills in detecting hidden information in multimedia data files using steganographic techniques.
The student can apply cryptological methods based on chaos theory and elliptic curves theory for creating and securing ciphers.
The student can apply cryptological methods based on chaos theory and elliptic curves theory for creating and securing ciphers.
teaching methods
Knowledge
Exercises on PC
Lecturing
Lecturing
Exercises on PC
assessment methods
Written examination
Written examination
Recommended literature
  • Bitto, Ondřej. Šifrování a biometrika, aneb, Tajemné bity a dotyky. Vyd. 1. Kralice na Hané : Computer Media, 2005. ISBN 80-86686-48-5.
  • Hanžl, Tomáš. Šifry a hry s nimi : kolektivní outdoorové hry se šiframi. Vyd. 1. Praha : Portál, 2007. ISBN 978-80-7367-196-9.
  • Katz, Jonathan. Introduction to modern cryptography. Boca Raton : Chapman & Hall/CRC, 2008. ISBN 978-1-58488-551-1.
  • Piper, F. C. Kryptografie. 1. vyd. v českém jazyce. Praha : Dokořán, 2006. ISBN 80-7363-074-5.
  • Singh, Simon. Kniha kódů a šifer : tajná komunikace od starého Egypta po kvantovou kryptografii. 1. vyd. v českém jazyce. Praha : Dokořán, 2003. ISBN 80-7203-499-5.
  • Swenson, Christopher. Modern cryptanalysis : techniques for advanced code breaking. Indianapolis : Wiley, 2008. ISBN 978-0-470-13593-8.
  • TILBORG, H. C. A. Fundamentals of Cryptology. Kluwer Academic Publishers, 2000. ISBN 0-7923-8675-2.
  • Vondruška, Pavel. Kryptologie, šifrování a tajná písma. 1. vyd. Praha : Albatros, 2006. ISBN 80-00-01888-8.
  • Zelenka, Josef. Ochrana dat : informační bezpečnost - výkladový slovník. Vyd. 1. Hradec Králové : Gaudeamus, 2002. ISBN 80-7041-197-X.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester