PV079 Applied Cryptography
Faculty of InformaticsAutumn 2024
- Extent and Intensity
- 1/1/2. 4 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
In-person direct teaching - Teacher(s)
- Mgr. Marek Sýs, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
RNDr. Ján Jančár (seminar tutor)
RNDr. Vojtěch Suchánek (seminar tutor)
RNDr. Antonín Dufka (seminar tutor)
RNDr. Andrij Stecko, Ph.D. (assistant)
Mgr. Jan Kvapil (assistant)
Lukasz Michal Chmielewski, PhD (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 25. 9. to Wed 18. 12. Wed 12:00–13:50 D2
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || IA174 Fundaments of Cryptography || NOW( IA174 Fundaments of Cryptography ) || SOUHLAS
It is recommended to register this course after a fundamental cryptography course (IA174 or another full-semester cryptography course), and for Master students a parallel registration of this course with such a basic cryptography course will be allowed. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 37 fields of study the course is directly associated with, display
- Course objectives
- To teach the students to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Learning outcomes
- At the end of the course students will be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues,
and topics cover:
Relations of symmetric and asymmetric cryptography. - Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Cryptanalysis.
- Patents and standards.
- Application of cryptography in selected systems - dedicated hardware security modules, wireless sensor networks, smartcards, privacy enhancing technologies.
- This course explores the issues of applied cryptography issues,
and topics cover:
- Literature
- recommended literature
- MENEZES, Alfred, Paul C. VAN OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xxviii, 78. ISBN 0849385237. URL info
- not specified
- VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
- Teaching methods
- lecture, non-trivial assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2023
- Extent and Intensity
- 1/1/2. 4 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (lecturer)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
RNDr. Ján Jančár (seminar tutor)
RNDr. Vojtěch Suchánek (seminar tutor)
RNDr. Antonín Dufka (seminar tutor)
RNDr. Andrij Stecko, Ph.D. (assistant)
RNDr. Adam Janovský (seminar tutor)
Mgr. Jan Kvapil (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 12:00–13:50 D2
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || IA174 Fundaments of Cryptography || NOW( IA174 Fundaments of Cryptography ) || SOUHLAS
It is recommended to register this course after a fundamental cryptography course (IA174 or IV054 if taken before 2022), and for Master students a parallel registration of this course with such a basic cryptography course will be allowed. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 77 fields of study the course is directly associated with, display
- Course objectives
- To teach the students to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Learning outcomes
- At the end of the course students will be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues,
and topics cover:
Relations of symmetric and asymmetric cryptography. - Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Cryptanalysis.
- Patents and standards.
- Application of cryptography in selected systems - dedicated hardware security modules, wireless sensor networks, smartcards, privacy enhancing technologies.
- This course explores the issues of applied cryptography issues,
and topics cover:
- Literature
- recommended literature
- MENEZES, Alfred, Paul C. VAN OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xxviii, 78. ISBN 0849385237. URL info
- not specified
- VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
- Teaching methods
- lecture, non-trivial assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2022
- Extent and Intensity
- 1/1/2. 4 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (lecturer)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
RNDr. Ján Jančár (seminar tutor)
RNDr. Vojtěch Suchánek (seminar tutor)
RNDr. Antonín Dufka (seminar tutor)
RNDr. Andrij Stecko, Ph.D. (assistant)
RNDr. Adam Janovský (seminar tutor) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 12:00–13:50 D2
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || IA174 Fundaments of Cryptography || NOW( IA174 Fundaments of Cryptography ) || SOUHLAS
It is recommended to register this course after a fundamental cryptography course (IA174 or IV054 if taken before 2022), and for Master students a parallel registration of this course with such a basic cryptography course will be allowed. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 77 fields of study the course is directly associated with, display
- Course objectives
- To teach the students to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Learning outcomes
- At the end of the course students will be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues,
and topics cover:
Relations of symmetric and asymmetric cryptography. - Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Cryptanalysis.
- Patents and standards.
- Application of cryptography in selected systems - dedicated hardware security modules, wireless sensor networks, smartcards, privacy enhancing technologies.
- This course explores the issues of applied cryptography issues,
and topics cover:
- Literature
- recommended literature
- MENEZES, Alfred, Paul C. VAN OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xxviii, 78. ISBN 0849385237. URL info
- not specified
- VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
- Teaching methods
- lecture, non-trivial assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2021
- Extent and Intensity
- 1/1/2. 4 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (lecturer)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
RNDr. Vladimír Sedláček, Ph.D. (assistant)
RNDr. Ján Jančár (seminar tutor)
RNDr. Vojtěch Suchánek (seminar tutor)
RNDr. Antonín Dufka (seminar tutor)
Arnab Roy, PhD (assistant)
RNDr. Andrij Stecko, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 13. 9. to Mon 6. 12. Mon 8:00–9:50 D2
- Prerequisites
- IV054 Cryptography and C.Protocols || NOW( IV054 Cryptography and C.Protocols ) || PřF:M0170 Cryptography || IA174 Fundaments of Cryptography || NOW( IA174 Fundaments of Cryptography ) || SOUHLAS
It is recommended to register this course after a fundamental cryptography course (IA174 or IV054), and for Master students a parallel registration of this course with such a basic cryptography course will be allowed. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 76 fields of study the course is directly associated with, display
- Course objectives
- To teach the students to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Learning outcomes
- At the end of the course students will be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues,
and topics cover:
Relations of symmetric and asymmetric cryptography. - Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Cryptanalysis.
- Patents and standards.
- Application of cryptography in selected systems - dedicated hardware security modules, wireless sensor networks, smartcards, privacy enhancing technologies.
- This course explores the issues of applied cryptography issues,
and topics cover:
- Literature
- recommended literature
- MENEZES, Alfred, Paul C. VAN OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xxviii, 78. ISBN 0849385237. URL info
- not specified
- VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2020
- Extent and Intensity
- 1/1/2. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (assistant)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
RNDr. Martin Ukrop, Ph.D. (assistant)
RNDr. Vladimír Sedláček, Ph.D. (assistant)
RNDr. Matúš Nemec, Ph.D. (assistant)
RNDr. Vojtěch Suchánek (seminar tutor)
RNDr. Ján Jančár (seminar tutor)
RNDr. Antonín Dufka (assistant)
RNDr. Adam Janovský (assistant)
RNDr. Dušan Klinec, Ph.D. (assistant)
RNDr. Lukáš Němec, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (alternate examiner) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 8:00–9:50 D3
- Prerequisites
- IV054 Cryptography and C.Protocols || NOW( IV054 Cryptography and C.Protocols ) || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV157 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 76 fields of study the course is directly associated with, display
- Course objectives
- To teach the students to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Learning outcomes
- At the end of the course students will be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Patents and standards.
- Application of cryptography in selected systems - wireless sensor networks, smartcards, privacy enhancing technologies.
- Literature
- recommended literature
- MENEZES, Alfred, Paul C. VAN OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xxviii, 78. ISBN 0849385237. URL info
- not specified
- VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2019
- Extent and Intensity
- 1/1/2. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (assistant)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
RNDr. Martin Ukrop, Ph.D. (assistant)
RNDr. Vladimír Sedláček, Ph.D. (assistant)
RNDr. Matúš Nemec, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 10:00–11:50 A217
- Prerequisites
- IV054 Cryptography and C.Protocols || NOW( IV054 Cryptography and C.Protocols ) || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV157 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 76 fields of study the course is directly associated with, display
- Course objectives
- To teach the students to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Learning outcomes
- At the end of the course students will be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Patents and standards.
- Application of cryptography in selected systems - wireless sensor networks, smartcards, privacy enhancing technologies.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2018
- Extent and Intensity
- 1/1/2. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (assistant)
RNDr. Andrij Stecko, Ph.D. (assistant)
RNDr. Matúš Nemec, Ph.D. (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 14:00–15:50 A217
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV157 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 39 fields of study the course is directly associated with, display
- Course objectives
- To teach the students to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Learning outcomes
- At the end of the course students will be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Patents and standards.
- Application of cryptography in selected systems - wireless sensor networks, smartcards, privacy enhancing technologies.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2017
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (assistant)
RNDr. Andrij Stecko, Ph.D. (assistant)
RNDr. Martin Ukrop, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 8:00–9:50 A318
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV157 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 39 fields of study the course is directly associated with, display
- Course objectives
- To teach the students to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Learning outcomes
- At the end of the course students will be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Patents and standards.
- Application of cryptography in selected systems - wireless sensor networks, smartcards, privacy enhancing technologies.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2016
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Andrij Stecko, Ph.D. (assistant)
Mgr. Marek Sýs, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 14:00–15:50 A318
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV157 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 39 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Patents and standards.
- Application of cryptography in selected systems - wireless sensor networks, smartcards, privacy enhancing technologies.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2015
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Andrij Stecko, Ph.D. (assistant)
Mgr. Marek Sýs, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 14:00–15:50 A318
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV157 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 39 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Patents and standards.
- Application of cryptography in selected systems - wireless sensor networks, smartcards, privacy enhancing technologies.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2014
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Andrij Stecko, Ph.D. (assistant)
RNDr. Filip Jurnečka, Ph.D. (assistant)
Mgr. Marek Sýs, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 8:00–9:50 A318
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV157 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 38 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- Application of cryptography in selected systems - wireless sensor networks, smartcards, privacy enhancing technologies.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2013
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Andrij Stecko, Ph.D. (assistant)
RNDr. Filip Jurnečka, Ph.D. (assistant)
Mgr. Marek Sýs, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 8:00–9:50 G126
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV080 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 38 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- Application of cryptography in selected systems.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2012
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (assistant)
RNDr. Andrij Stecko, Ph.D. (assistant)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Filip Jurnečka, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Luděk Matyska, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 10:00–11:50 G123
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV080 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 38 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- Application of cryptography in selected systems.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2011
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
RNDr. Andrij Stecko, Ph.D. (seminar tutor)
RNDr. Jiří Kůr, Ph.D. (seminar tutor)
RNDr. Filip Jurnečka, Ph.D. (seminar tutor) - Guaranteed by
- prof. RNDr. Luděk Matyska, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Timetable
- Mon 10:00–11:50 B204
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV080 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 39 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- Application of cryptography in selected systems.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2010
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Jiří Kůr, Ph.D. (seminar tutor)
RNDr. Andrij Stecko, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Timetable
- Mon 10:00–11:50 B204
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV080 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 43 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- Application of cryptography in selected systems.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2009
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Jiří Kůr, Ph.D. (seminar tutor)
RNDr. Andrij Stecko, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Timetable
- Mon 10:00–11:50 B204
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV080 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 41 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- Application of cryptography in selected systems.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2008
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Andrij Stecko, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Timetable
- Mon 10:00–11:50 B204
- Prerequisites
- SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV080 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 38 fields of study the course is directly associated with, display
- Course objectives
- This course explores the issues of cryptography deployment issues,
standards and applications. The course enhances students' working
experience with up-to-date cryptosystems, and enables them to
deploy cryptography effectively.
At least one seminar group will use English as the working language (including work on assignments, etc.), this will be agreed with the lecturer at the course start. - Syllabus
- Topics depend on recent developments in the area, but usually cover: Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- State restrictions and cryptology.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50 % of the final grade. Both the course and the final exam are in English.
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2007
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Andrij Stecko, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Timetable
- Thu 10:00–11:50 B204
- Prerequisites
- It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV080 prior to this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 37 fields of study the course is directly associated with, display
- Course objectives
- This course explores the issues of cryptography deployment issues,
standards and applications. The course enhances students' working
experience with up-to-date cryptosystems, and enables them to
deploy cryptography effectively.
At least one seminar group will use English as the working language (including work on assignments, etc.), this will be agreed with the lecturer at the course start. - Syllabus
- Topics depend on recent developments in the area, but usually cover: Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- State restrictions and cryptology.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Assessment methods (in Czech)
- Final "open book" exam accounts for 50% and assignments also for 50 % of the final grade. Both the course and the final exam are in English.
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2006
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Timetable
- Wed 12:00–12:50 B204
- Timetable of Seminar Groups:
PV079/03: Thu 9:00–9:50 B117, P. Švenda - Prerequisites
- It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV080 prior to this course.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 17 fields of study the course is directly associated with, display
- Course objectives
- This course explores the issues of cryptography deployment issues,
standards and applications. The course enhances students' working
experience with up-to-date cryptosystems, and enables them to
deploy cryptography effectively.
At least one seminar group will use English as the working language (including work on assignments, etc.), this will be agreed with the lecturer at the course start. - Syllabus
- Topics depend on recent developments in the area, but usually cover: Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- State restrictions and cryptology.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Assessment methods (in Czech)
- Final "open book" exam accounts for 50% and assignments also for 50 % of the final grade. Both the course and the final exam are in English.
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2005
- Extent and Intensity
- 1/3. 4 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
prof. RNDr. Tomáš Pitner, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Timetable
- Tue 16:00–17:50 B410
- Prerequisites
- ! P079 Applied Cryptography
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV017 prior to this course.
Both the course and the final exam are in English. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 17 fields of study the course is directly associated with, display
- Course objectives
- This course is aimed at students of a cryptography course who wish to explore selected topics in cryptography in a greater depth, with a particular focus on cryptography deployment issues, standards and applications. The course enhances students' working experience with up-to-date cryptosystems, and enables them to deploy cryptography effectively.
- Syllabus
- Topics depend on recent developments in the area, but usually cover:
- Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- State restrictions and cryptology.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Assessment methods (in Czech)
- Final "open book" exam accounts for 50% and assignments also for 50 % of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2004
- Extent and Intensity
- 1/3. 4 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
prof. RNDr. Tomáš Pitner, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant) - Guaranteed by
- doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Timetable
- Thu 2. 12. 15:00–17:50 B011, Thu 9. 12. 15:00–17:50 B011, Thu 16. 12. 15:00–17:50 B011
- Prerequisites
- ! P079 Applied Cryptography
It is recommended to register this course after a cryptography course (M024 or I054). It is also suggested to have PV017.
Both the course and the final exam are in English. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 17 fields of study the course is directly associated with, display
- Course objectives
- This course is aimed at students of a cryptography course who wish to explore selected topics in cryptography in a greater depth, with a particular focus on cryptography deployment issues, standards and applications. The course enhances students' working experience with up-to-date cryptosystems, and enables them to deploy cryptography effectively.
- Syllabus
- Topics depend on recent developments in the area, but usually cover:
- Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- State restrictions and cryptology.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471128457. info
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- Final "open book" exam accounts for 50% and assignments also for 50 % of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
- Teacher's information
- http://www.fi.muni.cz/usr/matyas/lecture/pv079.html
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2003
- Extent and Intensity
- 1/3. 4 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Petr Švéda (assistant) - Guaranteed by
- doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Prerequisites
- ! P079 Applied Cryptography
It is recommended to register this course after a cryptography course (M024 or I054). It is also suggested to have PV017.
Both the course and the final exam are in English. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Informatics (programme FI, B-IN)
- Informatics (programme FI, M-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-SS)
- Information Technology (programme FI, B-IN)
- Course objectives
- This course is aimed at students of a cryptography course who wish to explore selected topics in cryptography in a greater depth, with a particular focus on cryptography deployment issues, standards and applications. The course enhances students' working experience with up-to-date cryptosystems, and enables them to deploy cryptography effectively.
- Syllabus
- Topics depend on recent developments in the area, but usually cover:
- Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- State restrictions and cryptology.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471128457. info
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- Final "open book" exam accounts for 50% and assignments also for 50 % of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Further Comments
- The course is taught annually.
The course is taught: every week. - Listed among pre-requisites of other courses
- Teacher's information
- http://www.fi.muni.cz/usr/matyas/lecture/pv079.html
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2002
- Extent and Intensity
- 1/3. 4 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
- Guaranteed by
- doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. - Timetable
- Tue 10:00–11:50 B410
- Prerequisites
- ! P079 Applied Cryptography
Can be registered only after a cryptography course (M024 or I054). It is also suggested to have P017 Information Technology Security. Related courses: P018 Seminar on Information Technology Security, P046 Information Systems and the Law and P080 Data Protection and Information Privacy.
Both the course and the final exam are in English. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Informatics (programme FI, B-IN)
- Informatics (programme FI, M-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-SS)
- Information Technology (programme FI, B-IN)
- Course objectives
- This course is aimed at students of a cryptography course who wish to explore selected topics in cryptography in a greater depth, with a particular focus on cryptography deployment issues, standards and applications. The course enhances students' working experience with up-to-date cryptosystems, and enables them to deploy cryptography effectively.
- Syllabus
- Topics depend on recent developments in the area, but usually cover:
- Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- State restrictions and cryptology.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471128457. info
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- Final "open book" exam accounts for 50% and assignments also for 50 % of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
- Teacher's information
- http://www.fi.muni.cz/usr/matyas/lecture/p079.html
- Enrolment Statistics (recent)