Skip to main content
Skip header

Cryptography and Computer Security

Summary

This subject provides an explanation of basic contents of IT security. It focuses on the symetric and public-key cryptography, cryptographic hash functions, authentication protocols, digital signatures and certificates. Course contains a survey of standards and covers legislative aspects of IT security.

Literature

[1] Ochodková E., Matematické základy kryptografických algoritmů, http://mi21.vsb.cz/modul/matematicke-zaklady-kryptografickych-algoritmu
[2] Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999 a pozdější
[3] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7 , October 1996, 816 pages, http://www.cacr.math.uwaterloo.ca/hac/

Advised literature

[1] Schneier B.: Applied cryptography, John Wiley & Sons, New York, 1995 (2nd edition)
[2] Pfleeger Ch.P.: Security in Computing, Prentice Hall, 1997 a pozdější
[3] Gollmann D.: Computer Security , Wiley 2000


Language of instruction čeština, čeština, angličtina
Code 460-4046
Abbreviation KPB
Course title Cryptography and Computer Security
Coordinating department Department of Computer Science
Course coordinator RNDr. Eliška Ochodková, Ph.D.