FI:PV079 Applied Cryptography - Course Information
PV079 Applied Cryptography
Faculty of InformaticsAutumn 2015
- Extent and Intensity
- 1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Andrij Stecko, Ph.D. (assistant)
Mgr. Marek Sýs, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 14:00–15:50 A318
- Prerequisites
- IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV157 prior to this course. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 39 fields of study the course is directly associated with, display
- Course objectives
- At the end of the course students should be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of their security and efficiency. - Syllabus
- This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
- Generation of random and pseudorandom sequences.
- Hash functions and their applications.
- Digital signatures, MAC. Non-repudiation.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Patents and standards.
- Application of cryptography in selected systems - wireless sensor networks, smartcards, privacy enhancing technologies.
- Literature
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
- Teaching methods
- lecture, assignments (home work) of applied nature
- Assessment methods
- Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
- Enrolment Statistics (Autumn 2015, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2015/PV079