Skip to main content
Skip header

Cryptography and Computer Security

* Exchange students do not have to consider this information when selecting suitable courses for an exchange stay.

Course Unit Code460-4046/02
Number of ECTS Credits Allocated4 ECTS credits
Type of Course Unit *Compulsory
Level of Course Unit *Second Cycle
Year of Study *First Year
Semester when the Course Unit is deliveredSummer Semester
Mode of DeliveryFace-to-face
Language of InstructionCzech
Prerequisites and Co-Requisites Course succeeds to compulsory courses of previous semester
Name of Lecturer(s)Personal IDName
OH140RNDr. Eliška Ochodková, Ph.D.
Summary
This subject provides an explanation of basic contents of IT security. It focuses on the symetric and public-key cryptography, cryptographic hash functions, authentication protocols, digital signatures and certificates. Course contains a survey of standards and covers legislative aspects of IT security.
Learning Outcomes of the Course Unit
After graduation student will be able to:
1. Classify various kinds of attacks.
2. Classify particular security goals and security mechanisms dedicated to gain them.
3. Categorize cryptographic mechanisms.
4. Formulate mathematical background of cryptographic algorithms.
5. Design security mechanisms.
6. Demonstrate practical usage of cryptographic mechanisms and applied them.
7. Cooperate on project.
Course Contents
Lectures:
Introduction to information and data security. Basic concepts: attacks, risks, security functions and mechanisms, vulnerabilities.
Introduction to number theory.
Cryptography: basic concepts, cryptanalytic attacks.
Cryptography: classical techniques and its cryptanalysis.
Cryptography: symetric algorithms, basic concepts and principles, block cipher modes of operation, DES, AES.
Cryptography: aymetric algorithms (public-key cryptography), basic concepts and principles. RSA,
ELGamal.
Key management. Key exchange, Diffie-Hellman.
Authentication, authentication protocols, biometry.
Hash function, MAC.
Digital signature, DSS. Certificates, certificate authority.
Eliptic curve cryptography.
Firewalls, electronic mail security (PEM,
PGP, S/MIME), SSL.
Standards (ITSEC, ITSEM, Common Criteria,
ISO 9000,...) and legislative aspects of IT security.
Recommended or Required Reading
Required Reading:
[1] Ochodková E., Matematické základy kryptografických algoritmů, http://mi21.vsb.cz/modul/matematicke-zaklady-kryptografickych-algoritmu
[2] Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999 a pozdější
[3] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7, October 1996, 816 pages, http://www.cacr.math.uwaterloo.ca/hac/


[1] Ochodková E., Matematické základy kryptografických algoritmů, http://mi21.vsb.cz/modul/matematicke-zaklady-kryptografickych-algoritmu
[2] Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999 a pozdější
[3] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7, October 1996, 816 pages, http://www.cacr.math.uwaterloo.ca/hac/


Recommended Reading:
[1] Schneier B.: Applied cryptography, John Wiley & Sons, New York, 1995 (2nd edition)
[2] Pfleeger Ch.P.: Security in Computing, Prentice Hall, 1997 a pozdější
[3] Gollmann D.: Computer Security , Wiley 2000
[1] Schneier B.: Applied cryptography, John Wiley & Sons, New York, 1995 (2nd edition)
[2] Pfleeger Ch.P.: Security in Computing, Prentice Hall, 1997 a pozdější
[3] Gollmann D.: Computer Security , Wiley 2000
Planned learning activities and teaching methods
Lectures, Tutorials
Assesment methods and criteria
Task TitleTask TypeMaximum Number of Points
(Act. for Subtasks)
Minimum Number of Points for Task Passing
Credit and ExaminationCredit and Examination100 (100)51
        CreditCredit45 25
        ExaminationExamination55 20