Skip to main content
Skip header

Cryptography and Computer Security

Type of study Follow-up Master
Language of instruction Czech
Code 460-4046/02
Abbreviation KPB
Course title Cryptography and Computer Security
Credits 4
Coordinating department Department of Computer Science
Course coordinator RNDr. Eliška Ochodková, Ph.D.

Subject syllabus

Lectures:
• Introduction to information and data security. Basic concepts: attacks, risks, security functions and mechanisms, vulnerabilities.
• Introduction to number theory.
• Cryptography: basic concepts, cryptanalytic attacks.
• Cryptography: classical techniques and its cryptanalysis.
• Cryptography: symetric algorithms, basic concepts and principles, block cipher modes of operation, DES, AES.
• Cryptography: aymetric algorithms (public-key cryptography), basic concepts and principles. RSA, ELGamal.
• Key management. Key exchange, Diffie-Hellman.
• Authentication, authentication protocols, biometry.
• Hash function, MAC.
• Digital signature, DSS. Certificates, certificate authority.
• Eliptic curve cryptography.
• Firewalls, electronic mail security (PEM, PGP, S/MIME), SSL.
• Standards (ITSEC, ITSEM, Common Criteria, ISO 9000,...) and legislative aspects of IT security.

Computer laboratories
• Practice the mathematical principles of the algorithms discussed.
• Modular arithmetic.
• Algebraic structures.
• Number theory.
• Historical cryptography.
• Symmetric cryptography.
• Asymmetric cryptography.
• Hashing functions.
• Practical examples of security applications and protocols I.
• Practical demonstrations of security applications and protocols II.
• Practical demonstrations of security applications and protocols III.

E-learning

Literature

[1] Ochodková E., Matematické základy kryptografických algoritmů, http://mi21.vsb.cz/modul/matematicke-zaklady-kryptografickych-algoritmu
[2] Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999 a pozdější
[3] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7 , October 1996, 816 pages, http://www.cacr.math.uwaterloo.ca/hac/

Advised literature

[1] Schneier B.: Applied cryptography, John Wiley & Sons, New York, 1995 (2nd edition)
[2] Pfleeger Ch.P.: Security in Computing, Prentice Hall, 1997 a pozdější
[3] Gollmann D.: Computer Security , Wiley 2000