FI:PV181 Lab - security, appl. crypto I - Course Information
PV181 Laboratory of security and applied cryptography I
Faculty of InformaticsAutumn 2013
- Extent and Intensity
- 0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: k (colloquium). Other types of completion: z (credit).
- Teacher(s)
- Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Mgr. Vít Bukač, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable of Seminar Groups
- PV181/01: Tue 14:00–15:50 G191a, Z. Říha
PV181/02: Wed 14:00–15:50 G191a, Z. Říha
PV181/03: Mon 10:00–11:50 G191a, Z. Říha - Prerequisites
- Registration to PV181 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Win32; 3) fluent English.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30 - fields of study / plans the course is directly associated with
- Applied Informatics (programme FI, B-AP)
- Applied Informatics (programme FI, N-AP)
- Information Technology Security (programme FI, N-IN)
- Bioinformatics (programme FI, B-AP)
- Bioinformatics (programme FI, N-AP)
- Information Systems (programme FI, N-IN)
- Informatics with another discipline (programme FI, B-EB)
- Informatics with another discipline (programme FI, B-FY)
- Informatics with another discipline (programme FI, B-IO)
- Informatics with another discipline (programme FI, B-MA)
- Informatics with another discipline (programme FI, B-TV)
- Informatics (eng.) (programme FI, D-IN4)
- Informatics (programme FI, D-IN4)
- Public Administration Informatics (programme FI, B-AP)
- Mathematical Informatics (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, N-IN)
- Computer Graphics and Image Processing (programme FI, B-IN)
- Computer Graphics (programme FI, N-IN)
- Computer Networks and Communication (programme FI, B-IN)
- Computer Networks and Communication (programme FI, N-IN)
- Computer Systems and Technologies (eng.) (programme FI, D-IN4)
- Computer Systems and Technologies (programme FI, D-IN4)
- Computer Systems and Data Processing (programme FI, B-IN)
- Computer Systems (programme FI, N-IN)
- Embedded Systems (eng.) (programme FI, N-IN)
- Programmable Technical Structures (programme FI, B-IN)
- Embedded Systems (programme FI, N-IN)
- Service Science, Management and Engineering (eng.) (programme FI, N-AP)
- Service Science, Management and Engineering (programme FI, N-AP)
- Social Informatics (programme FI, B-AP)
- Theoretical Informatics (programme FI, N-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, N-SS) (2)
- Artificial Intelligence and Natural Language Processing (programme FI, B-IN)
- Artificial Intelligence and Natural Language Processing (programme FI, N-IN)
- Image Processing (programme FI, N-AP)
- Course objectives
- The aim of this subject is to understand implementation details of cryptographic algortithms and protocols and to be able to apply the gained knowledge in practice. At the end of the course students should be able to design and implement cryptographic applications independently.
- Syllabus
- Principles of cryptography and cryptographic standards (symmetric cryptography, random number generation, hash functions, asymmetric cryptography, certificates, certification authority, PKI). Using cryptographic libraries in cryptoaplications (OpenSSL, Cryptlib, Microsoft Crypto API, Java). Digital Signatures (CMS/PKCS#7 structure, S/MIME, Czech legislation). Smartcards (using the PC/SC interface to communicate with the smartcards/smartcard readers, APDU commands/replies, Secure Messaging, Javacards and programming of own applications running on smartcards). Electronic passports (principles, access control, reading of data).
- Literature
- Schneier's cryptography classics library :applied cryptography, secrets and lies, and practical cryptography. ISBN 978-0-470-22626-1. info
- Smart card handbook. Edited by W. Rankl. 4th ed. Hoboken, N.J.: Wiley, 2010, xliv, 1043. ISBN 9780470743676. info
- RANKL, Wolfgang. Smart card applications : design models for using and programming smart cards. Translated by Kenneth Cox. Chichester: John Wiley & Sons, 2007, xviii, 217. ISBN 9780470058824. info
- VAUDENAY, Serge. A classical introduction to cryptography : applications for communications security. New York: Springer, 2006, xviii, 335. ISBN 0387254641. info
- CHEN, Zhiqun. Java Card technology for Smart Cards : architecture and programmer's guide. Boston: Addison-Wesley, 2000, xxii, 368. ISBN 0201703297. info
- Teaching methods
- seminars in a security lab, homeworks
- Assessment methods
- Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 12 homeworks (10 points each). To get the credit (Z) 50% of the points is required, to get the colloquium (P) 70% of the points is required.
- Language of instruction
- English
- Follow-Up Courses
- Further comments (probably available only in Czech)
- Study Materials
The course is taught annually.
- Enrolment Statistics (Autumn 2013, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2013/PV181