|
Lecturer(s)
|
-
Foltasová Eliška, Mgr.
-
Kolařík Miroslav, doc. RNDr. Ph.D.
-
Bartl Eduard, doc. RNDr. Ph.D.
-
Janoštík Radek, Mgr. Ph.D.
|
|
Course content
|
1. History of cryptography. 2. Classical symmetric-key methods. 3. Cryptoanalysis of classical symmetric-key methods. 4. Perfect cryptography. 5. Theoretical aspects. 6. DES and AES. 7. Introduction to asymmetric-key methods. 8. Asymmetric-key method based on discreet logarithm. 9. Asymmetric-key method based on knapsack problem. 10. Asymmetric-key method based on elliptic curves. 11. RSA. 12. Cryptographic hash functions. 13. Digital signature. 14. Zero-knowledge proofs and other interesting topics.
|
|
Learning activities and teaching methods
|
|
Lecture, Demonstration
|
|
Learning outcomes
|
Students will learn about cryptography.
|
|
Prerequisites
|
unspecified
|
|
Assessment methods and criteria
|
Oral exam, Written exam
Completion of assigned tasks. Passing an oral (or written) examination.
|
|
Recommended literature
|
-
Hoffstein J., Pipher J., Silverman J. H. (2010). An Introduction to Mathematical Cryptography. Springer.
-
Knut D. E. (1997). The Art of Computer Programming: Seminumerical Algorithms (Volume II). Addison-Wesley.
-
Menezes A. Handbook of Applied Cryptography. CRC Press.
-
Paar C., Pelzl J. Understanding Cryptography: A Textbook for Students and Practitioners. Springer.
-
Paar C., Pelzl J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag.
-
Přibyl J., Kodl J. (1996). Ochana dat v informatice. Praha.
-
Schneider, Bruce. (1996). Applied Cryptography. John Wiley & Sons, Inc.
-
Singh S. (2009). Kniha kódů a šifer. Dokořán.
-
Song Y. Yan. (2013). Computational Number Theory and Modern Cryptography. Wiley.
-
Stinson D. R. (2006). Cryptography : theory and practice. Chapman & Hall.
-
Stinson D. R., Paterson M. B. (2019). Cryptography: theory and practice (4th edition). CRC Press.
|