Course: Applied Cryptology

« Back
Course title Applied Cryptology
Course code AUIUI/AE7AK
Organizational form of instruction Lecture + Lesson
Level of course Master
Year of study not specified
Semester Winter
Number of ECTS credits 5
Language of instruction Czech, English
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Oulehla Milan, Ing. Ph.D.
  • Jašek Roman, prof. Mgr. Ph.D., DBA
Course content
Topics: 1.Modern cryptology (division, classification, terminology) 2. Mathematical apparatus and methods used in modern cryptology (algebraic structures) 3.Symmetric cryptography (selected algorithms, applications) 4.Asymetric cryptography (selected algorithms, applications) 5. Elliptic curves over finite fields and their applications 6. Cryptographic protocols 7. Selected cryptographic techniques 8. Selected cryptographic algorithms 9.Application of hash algorithms, integrity security, Blockchain technology 10. Selected vulnerabilities and attacks on cryptography 11.Modern cryptanalysis (Brute force attack, complexity theory, rainbow tables) 12.Linear and multilinear cryptanalysis 13. Differential cryptanalysis and derived procedures 14. Quantum cryptology and resistance to quantum computers

Learning activities and teaching methods
Lecturing, Exercises on PC
  • Educational trip - 0 hours per semester
  • Term paper - 15 hours per semester
  • Participation in classes - 48 hours per semester
  • Home preparation for classes - 50 hours per semester
  • Preparation for course credit - 10 hours per semester
  • Preparation for examination - 10 hours per semester
prerequisite
Knowledge
Completed course Cryptology AUIUI / A3KRY.
Completed course Cryptology AUIUI / A3KRY.
learning outcomes
Describe the evolution of cryptology, including those areas that are now considered dangerous
Describe the evolution of cryptology, including those areas that are now considered dangerous
Explain the principles of the mathematical apparatus underlying modern encryption algorithms
Explain the principles of the mathematical apparatus underlying modern encryption algorithms
Describe practical computation over algebraic structures that are used in modern cryptology
Describe practical computation over algebraic structures that are used in modern cryptology
Describe the problem of generating truly random and pseudo-random numbers, including possible pitfalls
Describe the problem of generating truly random and pseudo-random numbers, including possible pitfalls
Explain the principle of operation of selected ciphers that are essential for current technical practice
Explain the principle of operation of selected ciphers that are essential for current technical practice
Skills
To competently select encryption algorithms that are optimal for a given area of cryptologic activity
To competently select encryption algorithms that are optimal for a given area of cryptologic activity
Determine safe practices regarding keys (generation, safe lengths, key holding, etc.)
Determine safe practices regarding keys (generation, safe lengths, key holding, etc.)
Compile security policies that relate to cryptology and that can be ingested in modern technical practice
Compile security policies that relate to cryptology and that can be ingested in modern technical practice
Identify serious security problems that can be caused by possible attacks of modern ciphers
Identify serious security problems that can be caused by possible attacks of modern ciphers
Identify common security issues related to improper implementation of encryption algorithms
Identify common security issues related to improper implementation of encryption algorithms
teaching methods
Knowledge
Exercises on PC
Lecturing
Lecturing
Exercises on PC
assessment methods
Didactic test
Qualifying examination
Didactic test
Preparation of a presentation
Preparation of a presentation
Qualifying examination
Recommended literature
  • HOLOŠKA, Jiří. Umělá inteligence aplikovaná na kryptoanalýzu zaměřená na odhalování slabostí moderní kryptologie a počítačové bezpečnosti. Zlín, 2012. ISBN 978-80-7454-144-5.
  • KOHNO, Tadayoshi, Niels FERGUSON a Bruce SCHNEIER. Cryptography engineering: design principles and practical applications. Indianapolis, 2010. ISBN 978-0470474242.
  • OULEHLA, Milan a Roman JAŠEK. Moderní kryptografie. Praha, 2017. ISBN 978-80-87383-67-4.
  • PAAR, Christof a Jan PELZL. Understanding Cryptography. New York, 2010. ISBN 3642041000.
  • PIPER, F. C. a Sean MURPHY. Kryptografie. Praha, 2006. ISBN 80-7363-074-5.
  • PŘIBYL, Jiří a Jindřich KODL. Ochrana dat v informatice. Praha, 1996. ISBN 80-01-01664-1.
  • SCHNEIER, Bruce. Applied cryptography: protocols, algorithms, and source code in C. Indianapolis, 2015. ISBN 978-1-119-09672-6.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester