Skip to main content
Skip header

Basics of Cryptography

* Exchange students do not have to consider this information when selecting suitable courses for an exchange stay.

Course Unit Code460-2065/01
Number of ECTS Credits Allocated4 ECTS credits
Type of Course Unit *Choice-compulsory type A
Level of Course Unit *First Cycle
Year of Study *Second Year
Semester when the Course Unit is deliveredSummer Semester
Mode of DeliveryFace-to-face
Language of InstructionCzech
Prerequisites and Co-Requisites Course succeeds to compulsory courses of previous semester
Name of Lecturer(s)Personal IDName
OH140RNDr. Eliška Ochodková, Ph.D.
Summary
The primary aim of the course is to the basic principles of cryptographic algorithms. The basic definitions and construction of different cryptographic primitives, such as encryption schemes, digital signature schemes, or eg pseudorandom value generators and their applications in IT security, will be introduced. In particular, simple algorithms will be used to understand the basic chapters of numerical theory or algebraic structures theory.
Learning Outcomes of the Course Unit
After graduation student will be able to:
1. Classify various kinds of attacks.
2. Classify particular security goals and security mechanisms dedicated to gain them.
3. Categorize cryptographic mechanisms.
4. Formulate mathematical background of cryptographic algorithms.
5. Design security mechanisms.
6. Demonstrate practical usage of cryptographic mechanisms and applied them.
7. Cooperate on project.
Course Contents
Syllabus of lectures:
1. Cryptography and its role in IT security. Basic concepts: security services, mechanisms, threats, attacks, risks, vulnerabilities and their examples.
2. Classical (historical) cryptography I. Examples of ciphers and their principles.
3. Classical (historical) cryptography II. Examples of ciphers and their principles in today's context.
4. Cryptanalysis - Methods and types of attacks on classical cipher. Ciphertext only attack.
5. Mathematical foundations of cryptographic algorithms I (congruence, modular arithmetic, primes).
6. Mathematical foundations of cryptographic algorithms II (algebraic structures (groups, fields)).
7. Modern cryptographic algorithms - symmetric cryptography. Basic principles, examples of algorithms (DES, AES) and ways of using them (modes of operation). Applications in protocols.
8. Modern cryptographic algorithms - asymmetric cryptography. Basic principles, examples of algorithms (RSA, Diffie-Hellman). Applications inprotocols.
9. Modern cryptographic algorithms - hash function. Principles and algorithms. Applications in protocols.
10. Modern Cryptographic Algorithms - Digital Signature. Principles and algorithms. Applications in protocols.
11. Pseudorandom Generators (PRNG). Principles and their applications for cryptographic purposes.
12. Authentication protocols and cryptographic algorithms.
13. Related legislation, standards.

Syllabus of seminars:
The seminars will take place in a computer classroom. They will include both the practical implementation of simple cryptographic algorithms and their demonstration in existing tools and aplications. The focus will also be on the mathematical principles of cryptography.
1. Basic cryptographic concepts and principles - practice, examples
2. Classical cryptography I.
3. Classical cryptography II.
4. Simulation of simple cryptanalytical attacks.
5. Practice of mathematical principles of algorithms discussed - modular arithmetic.
6. Algebraic structures.
7. Theory of Numbers.
8. Symmetric cryptography.
9. Asymmetric cryptography.
10. Hash functions.
11. OpenSSL, PGP.
12. PRNG.
13. Practical examples of security applications and protocols.
Recommended or Required Reading
Required Reading:
Simon Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, 2000, ISBN:0385495323
Abraham Sinkov : Elementary Cryptanalysis: A Mathematical Approach, 1198 (a pozdější), ISBN-10: 0883856220
Stallings, W.: Cryptography and Network Security, Prentice Hall, 2005 (a pozdější), Print ISBN-10: 0-13-187316-4
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, ISBN:0-8493-8523-7, October 1996, 816 pages, http://www.cacr.math.uwaterloo.ca/hac/
Ochodková E., Matematické základy kryptografických algoritmů, 2011, http://mi21.vsb.cz/modul/matematicke-zaklady-kryptografickych-algoritmu
Simon Singh, Kniha kódů a šifer: Tajná komunikace od starého Egypta po kvantovou kryptografii, 2009, ISBN:978-80-7363-268-7
Abraham Sinkov : Elementary Cryptanalysis: A Mathematical Approach, 1198 (a pozdější), ISBN-10: 0883856220
Stallings, W.: Cryptography and Network Security, Prentice Hall, 2005 (a pozdější), Print ISBN-10: 0-13-187316-4
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, ISBN:0-8493-8523-7, October 1996, 816 pages, http://www.cacr.math.uwaterloo.ca/hac
Recommended Reading:
Schneier B.: Applied cryptography, John Wiley & Sons, New York, 1995 (2nd edition)
Pfleeger Ch.P.: Security in Computing, Prentice Hall, 1997 a pozdější
Gollmann D.: Computer Security , Wiley 2000
Schneier B.: Applied cryptography, John Wiley & Sons, New York, 1995 (2nd edition)
Pfleeger Ch.P.: Security in Computing, Prentice Hall, 1997 a pozdější
Gollmann D.: Computer Security , Wiley 2000
Planned learning activities and teaching methods
Lectures, Tutorials
Assesment methods and criteria
Task TitleTask TypeMaximum Number of Points
(Act. for Subtasks)
Minimum Number of Points for Task Passing
Graded creditGraded credit100 51