Skip to main content
Skip header

Cryptography and Computer Security

Summary

This subject provides an explanation of basic contents of IT security. It focuses on the symetric and public-key cryptography, cryptographic hash functions, authentication protocols, digital signatures and certificates. Course contains a survey of standards and covers legislative aspects of IT security.

Literature

Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999 and later
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC
Press, ISBN: 0-8493-8523-7 , October 1996, 816 pages,
http://www.cacr.math.uwaterloo.ca/hac/
Schneier B.: Applied cryptography, John Wiley & Sons, New York, 1995 (2nd edition)

Pfleeger Ch.P.: Security in Computing, Prentice Hall, 1997 and later
Gollmann D.: Computer Security , Wiley 2000

Advised literature

Nechvátal J.: Public-Key Cryptography, NIST Special Publication 800-2, http://csrc.nist.gov/publications/nistpubs/800-2/800-2.txt
Rivest R.L.: Cryptography and Security, http://theory.lcs.mit.edu/~rivest/
Ritter T.: Ciphers By Ritter: Cryptography and Technology, http://www.ciphersbyritter.com/
Savard J.: A Cryptograhpic Compendium, http://www.quadibloc.com/crypto/intro.htm
NIST - Computer Security Division, http://csrc.nist.gov/


Language of instruction čeština
Code 456-0303
Abbreviation KPB
Course title Cryptography and Computer Security
Coordinating department Department of Computer Science
Course coordinator RNDr. Eliška Ochodková, Ph.D.