Skip to main content
Skip header

ECTS Course Overview



Cryptography and Computer Security

* Exchange students do not have to consider this information when selecting suitable courses for an exchange stay.

Course Unit Code460-4046/03
Number of ECTS Credits Allocated4 ECTS credits
Type of Course Unit *Optional
Level of Course Unit *Second Cycle
Year of Study *
Semester when the Course Unit is deliveredSummer Semester
Mode of DeliveryFace-to-face
Language of InstructionCzech, English
Prerequisites and Co-Requisites Course succeeds to compulsory courses of previous semester
Name of Lecturer(s)Personal IDName
OH140RNDr. Eliška Ochodková, Ph.D.
Summary
This subject provides an explanation of basic contents of IT security. It focuses on the symetric and public-key cryptography, cryptographic hash functions, authentication protocols, digital signatures and certificates. Course contains a survey of standards and covers legislative aspects of IT security.
Learning Outcomes of the Course Unit
After graduation student will be able to:
1. Classify various kinds of attacks.
2. Classify particular security goals and security mechanisms dedicated to gain them.
3. Categorize cryptographic mechanisms.
4. Formulate mathematical background of cryptographic algorithms.
5. Design security mechanisms.
6. Demonstrate practical usage of cryptographic mechanisms and applied them.
7. Cooperate on project.
Course Contents
Lectures:
Introduction to information and data security. Basic concepts: attacks, risks, security functions and mechanisms, vulnerabilities.
Introduction to number theory.
Cryptography: basic concepts, cryptanalytic attacks.
Cryptography: classical techniques and its cryptanalysis.
Cryptography: symetric algorithms, basic concepts and principles, block cipher modes of operation, DES, AES.
Cryptography: aymetric algorithms (public-key cryptography), basic concepts and principles. RSA,
ELGamal.
Key management. Key exchange, Diffie-Hellman.
Authentication, authentication protocols, biometry.
Hash function, MAC.
Digital signature, DSS. Certificates, certificate authority.
Eliptic curve cryptography.
Firewalls, electronic mail security (PEM,
PGP, S/MIME), SSL.
Standards (ITSEC, ITSEM, Common Criteria,
ISO 9000,...) and legislative aspects of IT security.
Recommended or Required Reading
Required Reading:
Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999 and later
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC
Press, ISBN: 0-8493-8523-7, October 1996, 816 pages,
http://www.cacr.math.uwaterloo.ca/hac/
Schneier B.: Applied cryptography, John Wiley & Sons, New York, 1995 (2nd edition)

Pfleeger Ch.P.: Security in Computing, Prentice Hall, 1997 and later
Gollmann D.: Computer Security , Wiley 2000
Grošek O., Porubský Š.: Šifrovanie, algoritmy, metódy, prax, GRADA 1992
Garfinkel S., Spafford G.:Bezpečnost v UNIXu a Internetu v praxi , Computer Press 1998
Ochodková E., Matematické základy kryptografických algoritmů, http://mi21.vsb.cz/modul/matematicke-zaklady-kryptografickych-algoritmu
Povinná literatura:
Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999 a pozdější
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7, October 1996, 816 pages, http://www.cacr.math.uwaterloo.ca/hac/
Schneier B.: Applied cryptography, John Wiley & Sons, New York, 1995 (2nd edition)
Pfleeger Ch.P.: Security in Computing, Prentice Hall, 1997 a pozdější
Gollmann D.: Computer Security , Wiley 2000

Recommended Reading:
Nechvátal J.: Public-Key Cryptography, NIST Special Publication 800-2, http://csrc.nist.gov/publications/nistpubs/800-2/800-2.txt
Rivest R.L.: Cryptography and Security, http://theory.lcs.mit.edu/~rivest/
Ritter T.: Ciphers By Ritter: Cryptography and Technology, http://www.ciphersbyritter.com/
Savard J.: A Cryptograhpic Compendium, http://www.quadibloc.com/crypto/intro.htm
NIST - Computer Security Division, http://csrc.nist.gov/

Garfinkel S., Spafford G.:Bezpečnost v UNIXu a Internetu v praxi , Computer Press 1998
Dostálek L. a kol.: Velký průvodce protokoly TCP/IP: Bezpečnost, Computer Press, Praha 2001
Rivest R.L.: Cryptography and Security, http://theory.lcs.mit.edu/~rivest/
Ritter T.: Ciphers By Ritter: Cryptography and Technology, http://www.ciphersbyritter.com/
Savard J.: A Cryptograhpic Compendium, http://www.quadibloc.com/crypto/intro.htm
NIST - Computer Security Division, http://csrc.nist.gov/
český e-zin Crypo-World, http://crypto-world.info/
a mnoho dalších ...
Planned learning activities and teaching methods
Lectures, Tutorials
Assesment methods and criteria
Tasks are not Defined