|
Lecturer(s)
|
-
Čapek Jan, prof. Ing. CSc.
-
Hub Miloslav, doc. Ing. Ph.D.
|
|
Course content
|
Importance of information protection, security policy, risk analysis. Biometric authentication. Mathematical Foundations - Modular Arithmetic. Mathematical Foundations - Introduction to Number Theory, Circuits, Groups. Symmetric ciphers - methods, advantages and disadvantages of modern methods. Cryptanalysis. Asymmetric ciphers - methods, advantages and disadvantages of modern methods. Selected encryption techniques Vernam and Hill cipher, Selected RSA encryption techniques. El-Gamal, Diffie - Hellman. Selected encryption techniques DES, AES, etc Elliptic curves. Hash algorithms. Steganography.
|
|
Learning activities and teaching methods
|
Monologic (reading, lecture, briefing), Dialogic (discussion, interview, brainstorming)
- Contact teaching
- 52 hours per semester
- Preparation for an exam
- 50 hours per semester
- Individual project
- 20 hours per semester
- Preparation for a credit (assessment)
- 28 hours per semester
|
|
Learning outcomes
|
The aim of the course is to acquire advanced theoretical knowledge of information protection in their processing by means of computer technology and their transmissions by cryptology
A student who has successfully completed the course can: define basic concepts and know their use; describe information security objectives; mathematical fundamentals of cryptology; explain the principles of encryption techniques A student who has successfully completed the course know: Use encryption techniques; Select the appropriate encryption technique for the problem; Use encryption software; A student who has successfully completed the course is able to: Use encryption techniques; Select the appropriate encryption technique for the problem; Use encryption software;
|
|
Prerequisites
|
unspecified
|
|
Assessment methods and criteria
|
Oral examination, Written examination, Home assignment evaluation
Credit: is awarded based on the development and successful defense of assigned tasks within deadlines. Exam: written and oral, 65% is required to pass. The degree of knowledge and ability to apply acquired knowledge is examined. The condition is obtaining credit.
|
|
Recommended literature
|
-
FERGUSON,N., SCHNEIER, B.,TADAYOSIHI,K.. Cryptography Engineering: Design Principles and Practical Applications in Engineering Design. Wiley publishing, 2010. ISBN 978-0-470-47424-2.
-
SCHNEIER,B.. Applied cryptography, Protocols, Algoritthms, and Source Codxe in C. Wiley, 2015. ISBN 1119096723.
-
STALLINGS, W. Cryptography and network security : principles and practice. (7th Edition). Upper Saddle River: Pearson Education, 2016. ISBN 0134444284.
-
ZELENKA J., ČAPEK J., FRANCEK J., JANÁKOVÁ H. Ochrana dat. Kryptologie. Hradec Králové: Gaudeamus, 2003. ISBN 8070417374.
|