FI:PV181 Lab - security, appl. crypto I - Course Information
PV181 Laboratory of security and applied cryptography I
Faculty of InformaticsAutumn 2008
- Extent and Intensity
- 0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: z (credit). Other types of completion: k (colloquium).
- Teacher(s)
- Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
RNDr. Marek Kumpošt, Ph.D. (seminar tutor)
RNDr. Jiří Kůr, Ph.D. (seminar tutor)
RNDr. Václav Lorenc (seminar tutor)
RNDr. Andrij Stecko, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Timetable of Seminar Groups
- PV181/01: Mon 14:00–15:50 C516
PV181/02: Mon 16:00–17:50 C516
PV181/03: Tue 13:00–14:50 C516 - Prerequisites
- Registration to PV181 requires: 1) ability to work independently; 2) long-term interest in IT security (having done another IT security and/or cryptology courses and description of your interest in 3-10 sentences); 3) programming skills (ideally C and Java) under Unix/Linux or Win32; 4) fluent English; 5) team work ability.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30 - fields of study / plans the course is directly associated with
- Applied Informatics (programme FI, B-AP)
- Applied Informatics (programme FI, N-AP)
- Information Technology Security (programme FI, N-IN)
- Bioinformatics (programme FI, B-AP)
- Bioinformatics (programme FI, N-AP)
- Information Systems (programme FI, N-IN)
- Informatics with another discipline (programme FI, B-BI)
- Informatics with another discipline (programme FI, B-FY)
- Informatics with another discipline (programme FI, B-GE)
- Informatics with another discipline (programme FI, B-GK)
- Informatics with another discipline (programme FI, B-CH)
- Informatics with another discipline (programme FI, B-IO)
- Informatics with another discipline (programme FI, B-MA)
- Informatics with another discipline (programme FI, B-SO)
- Informatics with another discipline (programme FI, B-TV)
- Informatics (programme FI, B-IN)
- Informatics (programme FI, M-IN)
- Informatics (programme FI, N-IN)
- Mathematical Informatics (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, N-IN)
- Computer Graphics and Image Processing (programme FI, B-IN)
- Computer Graphics (programme FI, N-IN)
- Computer Networks and Communication (programme FI, B-IN)
- Computer Networks and Communication (programme FI, N-IN)
- Computer Systems and Data Processing (programme FI, B-IN)
- Computer Systems (programme FI, N-IN)
- Embedded Systems (eng.) (programme FI, N-IN)
- Programmable Technical Structures (programme FI, B-IN)
- Theoretical Informatics (programme FI, N-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-SS)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-TV)
- Upper Secondary School Teacher Training in Informatics (programme FI, N-SS) (2)
- Artificial Intelligence and Natural Language Processing (programme FI, B-IN)
- Artificial Intelligence and Natural Language Processing (programme FI, N-IN)
- Image Processing (programme FI, N-AP)
- Course objectives
- Students work an various aspects of cryptography and IT security, also help with the research projects of the lab (LaBAK - the Laboratory of security and applied cryptography).
- Syllabus
- Principles of cryptography and cryptographic standards (symmetrical cryptography, random number generation, hash functions, asymmetrical cryptography, certificates, certification authority, PKI). Cryptographic libraries (OpenSSL, Cryptlib, Microsoft Crypto API, Java). Digital Signatures (CMS/PKCS#7 structure, S/MIME, Czech legislation). Smartcards (PC/SC interface, APDU commands, Secure Messaging, Javacards and application programming), electronic passports.
- Literature
- Handbook of biometrics. Edited by Patrick J. Flynn - Arun A. Ross - Anil K. Jain. New York: Springer, 2008, x, 556. ISBN 9780387710402. info
- STALLINGS, William. Network security essentials :applications and standards. 2nd ed. Upper Saddle River: Prentice Hall, 2003, xv, 409 s. ISBN 0-13-120271-5. info
- JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
- Assessment methods
- Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 14 homeworks (10 points each). To get the credit (Z) 50% of the points are required.
- Language of instruction
- English
- Follow-Up Courses
- Further comments (probably available only in Czech)
- Study Materials
The course is taught annually.
- Enrolment Statistics (Autumn 2008, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2008/PV181