FI:I054 Cryptography and C.Protocols - Course Information
I054 Coding, Cryptography and Cryptographic Protocols
Faculty of InformaticsAutumn 1999
- Extent and Intensity
- 2/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
- Teacher(s)
- prof. RNDr. Jozef Gruska, DrSc. (lecturer)
- Guaranteed by
- prof. RNDr. Mojmír Křetínský, CSc.
Department of Computer Science – Faculty of Informatics
Contact Person: prof. RNDr. Jozef Gruska, DrSc. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Informatics (programme FI, B-IN)
- Informatics (programme FI, M-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-SS)
- Information Technology (programme FI, B-IN)
- Syllabus
- Coding theory and modern cryptography are rich on deep, elegant, interesting and practically very important ideas, methods, and systems. Main concepts of modern cryptography are closely connected with fundamental concepts of theoretical informatics. Current cryptohraphy and its methods and systems are of key importance for modern communication and information systems. Basic knowledge of coding methods and of modern cryptography are necessary for each graduate of informatics.
- Basic concepts of coding theory
- Linear codes
- Cyclic codes
- Classical cryptography
- Public-key cryptosystems
- RSA cryptosystems and digital signatures
- Integer factoprization and prime recognition
- Other cryptosystems
- Basic cryptographic protocols
- Zero-knowledge protocols
- Steganography
- From crypto-theory ro crypto-practice
- Quantum key distribution
- Quantum cryptographic protocols
- Literature
- Gruska, Jozef. Quantum computing, London, McGraw-Hill, 1999, 450 s, ISBN 0-07-709503-0
- GRUSKA, Jozef. Foundations of computing. London: International Thompson Computer Press, 1997, xv, 716 s. ISBN 1-85032-243-0. info
- SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471128457. info
- SALOMAA, Arto. Public-key cryptography. 2nd ed. Berlin: Springer, 1996, x, 271. ISBN 3540613560. info
- Language of instruction
- Czech
- Further Comments
- The course is taught annually.
The course is taught: every week.
- Enrolment Statistics (Autumn 1999, recent)
- Permalink: https://is.muni.cz/course/fi/autumn1999/I054