FI:PV079 Applied Cryptography - Course Information
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2019
- Extent and Intensity
- 1/1/2. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (assistant)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
RNDr. Martin Ukrop, Ph.D. (assistant)
RNDr. Vladimír Sedláček, Ph.D. (assistant)
RNDr. Matúš Nemec, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 10:00–11:50 A217
- Prerequisites
- IV054 Cryptography and C.Protocols || NOW( IV054 Cryptography and C.Protocols ) || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV157 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 76 fields of study the course is directly associated with, display
- Course objectives
- To teach the students to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Learning outcomes
- At the end of the course students will be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Patents and standards.
- Application of cryptography in selected systems - wireless sensor networks, smartcards, privacy enhancing technologies.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
- Enrolment Statistics (Autumn 2019, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2019/PV079