FI:IV054 Cryptography and C.Protocols - Course Information
IV054 Coding, Cryptography and Cryptographic Protocols
Faculty of InformaticsAutumn 2002
- Extent and Intensity
- 2/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
- Teacher(s)
- prof. RNDr. Jozef Gruska, DrSc. (lecturer)
doc. RNDr. Jan Bouda, Ph.D. (seminar tutor)
prof. Dr. phil. Jakub Mácha, Ph.D. (seminar tutor) - Guaranteed by
- prof. RNDr. Mojmír Křetínský, CSc.
Department of Computer Science – Faculty of Informatics
Contact Person: prof. RNDr. Jozef Gruska, DrSc. - Timetable
- Wed 10:00–11:50 D1
- Prerequisites (in Czech)
- ! I054 Cryptography and C.Protocols && ( MB005 Foundations of mathematics || MB101 Foundations of mathematics I || M005 Foundations of mathematics ) && ( MB003 Linear Algebra and Geometry I || MB102 Mathematics II || M003 Linear Algebra and Geometry I )
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Informatics (programme FI, B-IN)
- Informatics (programme FI, M-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-SS)
- Course objectives
- Lecture deals with the basic methods how to solve three key problems of the transmission of information. All three problems are of large practical importance and their solutions are based on elegant theoretical results. The first problem is how to make secure transmission of information through a noisy channel. Error-correcting codes are the main toolsfor doing that and they are dealt with in the first three lectures. Theory of error-coreecting codes is one of the most applied parts of algebra. Second problem is how to achieve that transmitted information does not get into un-authorized parties. Cryptography deals with this problem by developing various encryption and decryption methods. Related problems are that of the development of systems for secure digital signatures and cryptographic protocols that allow to perform several secure communication or cooperation tasks among various parties. Methods of classical and quantum cryptography will be introduced. Third problem is how to hide information to be transmitted in some other innoncently looking information. This task is of growing importance for a variety of reasons and a protection of intelectual properties is one of them. Basic techniques of steganography will be presented.
- Syllabus
- Coding theory and modern cryptography are rich on deep, elegant, interesting and practically very important ideas, methods, and systems. Main concepts of modern cryptography are closely connected with fundamental concepts of theoretical informatics. Current cryptohraphy and its methods and systems are of key importance for modern communication and information systems. Basic knowledge of coding methods and of modern cryptography are necessary for each graduate of informatics.
- Lecture will be rich also on examples and experiences from a very rich and interesting history of cryptography.
- Basic concepts of coding theory
- Linear codes
- Cyclic codes
- Classical cryptography
- Public-key cryptosystems
- RSA cryptosystems and digital signatures
- Integer factorization and prime recognition
- Other cryptosystems
- Basic cryptographic protocols
- Zero-knowledge protocols
- Steganography
- From crypto-theory ro crypto-practice
- Quantum key distribution
- Quantum cryptographic protocols
- Literature
- GRUSKA, Jozef. Quantum computing. London: McGraw-Hill Companies, 1999, xv, 439. ISBN 0077095030. info
- GRUSKA, Jozef. Foundations of computing. London: International Thompson Computer Press, 1997, xv, 716 s. ISBN 1-85032-243-0. info
- SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471128457. info
- SALOMAA, Arto. Public-key cryptography. 2nd ed. Berlin: Springer, 1996, x, 271. ISBN 3540613560. info
- STINSON, Douglas Robert. Cryptography :theory and practice. Boca Raton: CRC Press, 1995, 434 s. ISBN 0-8493-8521-0. info
- Assessment methods (in Czech)
- Zkouska probiha ustne v cestine, slovenstine nebo anglictine podle vyberu studenta. Zadani zkousky je v anglictine.
- Language of instruction
- Slovak
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
- Enrolment Statistics (Autumn 2002, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2002/IV054