Course: Cryptography

» List of faculties » PRF » KMI
Course title Cryptography
Course code KMI/KRY
Organizational form of instruction Lecture + Exercise
Level of course Master
Year of study not specified
Semester Winter
Number of ECTS credits 5
Language of instruction Czech, English
Status of course Compulsory-optional
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Course availability The course is available to visiting students
Lecturer(s)
  • Foltasová Eliška, Mgr.
  • Kolařík Miroslav, doc. RNDr. Ph.D.
  • Bartl Eduard, doc. RNDr. Ph.D.
  • Janoštík Radek, Mgr. Ph.D.
Course content
1. History of cryptography. 2. Classical symmetric-key methods. 3. Cryptoanalysis of classical symmetric-key methods. 4. Perfect cryptography. 5. Theoretical aspects. 6. DES and AES. 7. Introduction to asymmetric-key methods. 8. Asymmetric-key method based on discreet logarithm. 9. Asymmetric-key method based on knapsack problem. 10. Asymmetric-key method based on elliptic curves. 11. RSA. 12. Cryptographic hash functions. 13. Digital signature. 14. Zero-knowledge proofs and other interesting topics.

Learning activities and teaching methods
Lecture, Demonstration
Learning outcomes
Students will learn about cryptography.

Prerequisites
unspecified

Assessment methods and criteria
Oral exam, Written exam

Completion of assigned tasks. Passing an oral (or written) examination.
Recommended literature
  • Hoffstein J., Pipher J., Silverman J. H. (2010). An Introduction to Mathematical Cryptography. Springer.
  • Knut D. E. (1997). The Art of Computer Programming: Seminumerical Algorithms (Volume II). Addison-Wesley.
  • Menezes A. Handbook of Applied Cryptography. CRC Press.
  • Paar C., Pelzl J. Understanding Cryptography: A Textbook for Students and Practitioners. Springer.
  • Paar C., Pelzl J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag.
  • Přibyl J., Kodl J. (1996). Ochana dat v informatice. Praha.
  • Schneider, Bruce. (1996). Applied Cryptography. John Wiley & Sons, Inc.
  • Singh S. (2009). Kniha kódů a šifer. Dokořán.
  • Song Y. Yan. (2013). Computational Number Theory and Modern Cryptography. Wiley.
  • Stinson D. R. (2006). Cryptography : theory and practice. Chapman & Hall.
  • Stinson D. R., Paterson M. B. (2019). Cryptography: theory and practice (4th edition). CRC Press.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester
Faculty: Faculty of Science Study plan (Version): Applied Computer Science - Specialization in Software Development (2024) Category: Informatics courses 1 Recommended year of study:1, Recommended semester: Winter
Faculty: Faculty of Science Study plan (Version): Teaching Training in Computer Science for Secondary Schools (2019) Category: Pedagogy, teacher training and social care 1 Recommended year of study:1, Recommended semester: Winter
Faculty: Faculty of Science Study plan (Version): Mathematics (2023) Category: Mathematics courses 1 Recommended year of study:1, Recommended semester: Winter
Faculty: Faculty of Science Study plan (Version): Computer Science - Specialization in Artificial Intelligence (2020) Category: Informatics courses 1 Recommended year of study:1, Recommended semester: Winter
Faculty: Faculty of Science Study plan (Version): Applied Computer Science - Specialization in Computer Systems and Technologies (2024) Category: Informatics courses 1 Recommended year of study:1, Recommended semester: Winter
Faculty: Faculty of Science Study plan (Version): Bioinformatics (2021) Category: Informatics courses 1 Recommended year of study:1, Recommended semester: Winter
Faculty: Faculty of Science Study plan (Version): Computer Science - Specialization in General Computer Science (2020) Category: Informatics courses 1 Recommended year of study:1, Recommended semester: Winter