FI:PV079 Applied Cryptography - Course Information
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2007
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Andrij Stecko, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Timetable
- Thu 10:00–11:50 B204
- Prerequisites
- It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV080 prior to this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Applied Informatics (programme FI, B-AP)
- Applied Informatics (programme FI, N-AP)
- Information Technology Security (programme FI, N-IN)
- Bioinformatics (programme FI, B-AP)
- Bioinformatics (programme FI, N-AP)
- Information Systems (programme FI, N-IN)
- Informatics with another discipline (programme FI, B-BI)
- Informatics with another discipline (programme FI, B-FY)
- Informatics with another discipline (programme FI, B-GE)
- Informatics with another discipline (programme FI, B-GK)
- Informatics with another discipline (programme FI, B-CH)
- Informatics with another discipline (programme FI, B-IO)
- Informatics with another discipline (programme FI, B-MA)
- Informatics with another discipline (programme FI, B-SO)
- Informatics with another discipline (programme FI, B-TV)
- Informatics (programme FI, B-IN)
- Informatics (programme FI, M-IN)
- Informatics (programme FI, N-IN)
- Mathematical Informatics (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, N-IN)
- Computer Graphics and Image Processing (programme FI, B-IN)
- Computer Graphics (programme FI, N-IN)
- Computer Networks and Communication (programme FI, B-IN)
- Computer Networks and Communication (programme FI, N-IN)
- Computer Systems and Data Processing (programme FI, B-IN)
- Computer Systems (programme FI, N-IN)
- Embedded Systems (eng.) (programme FI, N-IN)
- Programmable Technical Structures (programme FI, B-IN)
- Theoretical Informatics (programme FI, N-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-SS)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-TV)
- Upper Secondary School Teacher Training in Informatics (programme FI, N-SS) (2)
- Artificial Intelligence and Natural Language Processing (programme FI, B-IN)
- Artificial Intelligence and Natural Language Processing (programme FI, N-IN)
- Image Processing (programme FI, N-AP)
- Course objectives
- This course explores the issues of cryptography deployment issues,
standards and applications. The course enhances students' working
experience with up-to-date cryptosystems, and enables them to
deploy cryptography effectively.
At least one seminar group will use English as the working language (including work on assignments, etc.), this will be agreed with the lecturer at the course start. - Syllabus
- Topics depend on recent developments in the area, but usually cover: Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- State restrictions and cryptology.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Assessment methods (in Czech)
- Final "open book" exam accounts for 50% and assignments also for 50 % of the final grade. Both the course and the final exam are in English.
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
- Enrolment Statistics (Autumn 2007, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2007/PV079