Lecturer(s)
|
-
Žáček Petr, Ing. Ph.D.
-
Oulehla Milan, Ing. Ph.D.
-
Šenkeřík Roman, prof. Ing. Ph.D.
|
Course content
|
1. Basic concepts of cryptology, brief history, classifications, mathematical foundations, cryptographic rules. 2. Symmetric, asymmetric, and hybrid systems - principles. 3. Classical cryptology - substitution systems (monoalphabetic, polyalphabetic, and polygraphic ciphers). 4. Classical cryptology - transposition systems. 5. Introduction to modern cryptology, mathematical foundations of modern cryptology - complex modular arithmetic, discrete logarithm, factorization of primes. 6. One-way functions, principles and protocols of key exchange (Diffie Helman). 7. Stream ciphers. 8. Block ciphers. 9. Asymmetric systems with a public key. 10. Asymmetric systems with elliptic curves. 11. Cryptology based on chaos theory and quantum theory and other non-traditional modern cryptosystems. 12. Steganography. 13. Basic attacks on encryption systems, physical and practical assumptions. 14. Cryptanalysis
|
Learning activities and teaching methods
|
Lecturing, Exercises on PC
|
prerequisite |
---|
Knowledge |
---|
Knowledge from areas: Mathematics Fundamentals of Informatics Programming |
Knowledge from areas: Mathematics Fundamentals of Informatics Programming |
learning outcomes |
---|
The student can enumerate and define basic concepts of cryptology and describe its historical development and classifications. |
The student can enumerate and define basic concepts of cryptology and describe its historical development and classifications. |
The student understands the principles of symmetric, asymmetric, and hybrid cryptographic systems and can differentiate among them. |
The student understands the principles of symmetric, asymmetric, and hybrid cryptographic systems and can differentiate among them. |
The student has knowledge about classical substitution and transposition systems, including monoalphabetic, polyalphabetic, and polygraphic ciphers. |
The student has knowledge about classical substitution and transposition systems, including monoalphabetic, polyalphabetic, and polygraphic ciphers. |
The student can clarify the principles of modern cryptology, including one-way functions and key exchange principles. |
The student can clarify the principles of modern cryptology, including one-way functions and key exchange principles. |
The student understands the fundamentals of steganography and the applications of unconventional methods in cryptology and encryption. |
The student understands the fundamentals of steganography and the applications of unconventional methods in cryptology and encryption. |
Skills |
---|
The student can apply different encryption methods, including symmetric, asymmetric, and hybrid systems. |
The student can apply different encryption methods, including symmetric, asymmetric, and hybrid systems. |
The student is capable of implementing and using stream and block cipher algorithms in practical applications. |
The student is capable of implementing and using stream and block cipher algorithms in practical applications. |
The student can design systems for secure data transmission and verification using modern cryptographic principles. |
The student can design systems for secure data transmission and verification using modern cryptographic principles. |
The student has skills in detecting hidden information in multimedia data files using steganographic techniques. |
The student has skills in detecting hidden information in multimedia data files using steganographic techniques. |
The student can apply cryptological methods based on chaos theory and elliptic curves theory for creating and securing ciphers. |
The student can apply cryptological methods based on chaos theory and elliptic curves theory for creating and securing ciphers. |
teaching methods |
---|
Knowledge |
---|
Exercises on PC |
Lecturing |
Lecturing |
Exercises on PC |
assessment methods |
---|
Written examination |
Written examination |
Recommended literature
|
-
Bitto, Ondřej. Šifrování a biometrika, aneb, Tajemné bity a dotyky. Vyd. 1. Kralice na Hané : Computer Media, 2005. ISBN 80-86686-48-5.
-
Hanžl, Tomáš. Šifry a hry s nimi : kolektivní outdoorové hry se šiframi. Vyd. 1. Praha : Portál, 2007. ISBN 978-80-7367-196-9.
-
Katz, Jonathan. Introduction to modern cryptography. Boca Raton : Chapman & Hall/CRC, 2008. ISBN 978-1-58488-551-1.
-
Piper, F. C. Kryptografie. 1. vyd. v českém jazyce. Praha : Dokořán, 2006. ISBN 80-7363-074-5.
-
Singh, Simon. Kniha kódů a šifer : tajná komunikace od starého Egypta po kvantovou kryptografii. 1. vyd. v českém jazyce. Praha : Dokořán, 2003. ISBN 80-7203-499-5.
-
Swenson, Christopher. Modern cryptanalysis : techniques for advanced code breaking. Indianapolis : Wiley, 2008. ISBN 978-0-470-13593-8.
-
TILBORG, H. C. A. Fundamentals of Cryptology. Kluwer Academic Publishers, 2000. ISBN 0-7923-8675-2.
-
Vondruška, Pavel. Kryptologie, šifrování a tajná písma. 1. vyd. Praha : Albatros, 2006. ISBN 80-00-01888-8.
-
Zelenka, Josef. Ochrana dat : informační bezpečnost - výkladový slovník. Vyd. 1. Hradec Králové : Gaudeamus, 2002. ISBN 80-7041-197-X.
|