FI:PV079 Applied Cryptography - Course Information
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2017
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (assistant)
RNDr. Andrij Stecko, Ph.D. (assistant)
RNDr. Martin Ukrop, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 8:00–9:50 A318
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV157 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Applied Informatics (programme FI, B-AP)
- Applied Informatics (programme FI, N-AP)
- Information Technology Security (eng.) (programme FI, N-IN)
- Information Technology Security (programme FI, N-IN)
- Bioinformatics (programme FI, B-AP)
- Bioinformatics (programme FI, N-AP)
- Economic Information Systems (programme ESF, B-SI)
- Information Systems (programme FI, N-IN)
- Informatics with another discipline (programme FI, B-EB)
- Informatics with another discipline (programme FI, B-FY)
- Informatics with another discipline (programme FI, B-IO)
- Informatics with another discipline (programme FI, B-MA)
- Informatics with another discipline (programme FI, B-TV)
- Informatics (eng.) (programme FI, D-IN4)
- Informatics (programme FI, D-IN4)
- Public Administration Informatics (programme FI, B-AP)
- Mathematical Informatics (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, N-IN)
- Computer Graphics and Image Processing (programme FI, B-IN)
- Computer Graphics (programme FI, N-IN)
- Computer Networks and Communication (programme FI, B-IN)
- Computer Networks and Communication (programme FI, N-IN)
- Computer Systems and Technologies (eng.) (programme FI, D-IN4)
- Computer Systems and Technologies (programme FI, D-IN4)
- Computer Systems and Data Processing (programme FI, B-IN)
- Computer Systems (programme FI, N-IN)
- Embedded Systems (eng.) (programme FI, N-IN)
- Programmable Technical Structures (programme FI, B-IN)
- Embedded Systems (programme FI, N-IN)
- Service Science, Management and Engineering (eng.) (programme FI, N-AP)
- Service Science, Management and Engineering (programme FI, N-AP)
- Social Informatics (programme FI, B-AP)
- Theoretical Informatics (programme FI, N-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, N-SS) (2)
- Artificial Intelligence and Natural Language Processing (programme FI, B-IN)
- Artificial Intelligence and Natural Language Processing (programme FI, N-IN)
- Image Processing (programme FI, N-AP)
- Course objectives
- To teach the students to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Learning outcomes
- At the end of the course students will be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Patents and standards.
- Application of cryptography in selected systems - wireless sensor networks, smartcards, privacy enhancing technologies.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
- Enrolment Statistics (Autumn 2017, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2017/PV079