Lecturer(s)
|
-
Mlýnek Jaroslav, doc. RNDr. CSc.
|
Course content
|
1. Main reasons of electronic information securing a/ obligations arisen from valid legislative b/ commitments to other companies c/ own interests of companies 2. Cryptography - instrument to the ensuring of confidentiality, integrity and authenticity of information a/ basic definition (cryptography, cryptoanalysis, cryptology) b/ principle of encryption (plain text, cipher text, key) c/ encryption x coding 3. Introduction to number theory a/ fundamental terms b/ modular arithmetic 4. Classical cryptography a/ the substitution cipher b/ the transposition cipher c/ the stream cipher d/ the block cipher 5. Symmetric cipher a/ basic principle of encryption b/ a Vernam cipher 6. DES (Data Encryption Standard), Triple-DES 7. a/ AES (Advanced Encryption Standard Advanced Encryption Standard) b/ IDEA (International Data Encryption Algorithm) 8. Asymmetric cipher a/ basic principle of encryption b/ RSA cipher c/ other asymmetric ciphers 9. Digital signature a/ principle of digital signature b/ DSA (Digital Signature Algorithm) c/ most often use variations of digital signature 10. Digital signature and electronic signature, Electronic signature act n. 227/2000 11. Management of public keys of asymmetric encryption, a public key certificate, a certification authority (CA) 12. The principle of elliptic curve use in cryptography 13. Basic principles of coding 14. Reserve ----- The range of lessons for extra-mural study: 8 hours/semester
|
Learning activities and teaching methods
|
Monological explanation (lecture, presentation,briefing)
|
Learning outcomes
|
The aim of a course is to inform students about the basic cryptography tools and their usage during securing electronic information. Students will be acquainted with needs of information securing and with possibilities of cryptography tools. Lessons will be focused on the chosen parts of number theory, modular arithmetic, special mathematics functions, cipher systems, digital and electronic signature including management of pub-lic key of asymmetric encryption (a certificate of public key and activities of certificate authority). The basic principles of coding theory are explained as well.
Cryptography basic methods and use of these methods to security of electronic information.
|
Prerequisites
|
Basic course of higher mathematics
|
Assessment methods and criteria
|
Combined examination
Credit: participation on seminars Exam: written + oral part
|
Recommended literature
|
-
Adámek, J.:. Kódování.. SNTL, Praha, 1989.
-
Grošek, O., Porubský, Š.:. Šifrovanie - algoritmy, metódy, prax.. Grada, Praha, 1992. ISBN 80-86119-77-7.
-
Menezes, A. - Oorschot, P. - Vanstone, S.:. Handbook of Applied Cryptography.. Boca Raton, USA, CRC Press, 2001. ISBN 978-80-251-1511-4.
-
Mlýnek, J.:. Zabezpečení obchodních informací. Computer Press, Brno, 2007. ISBN 978-80-251-1511-4.
-
Přibyl , J.:. Informační bezpečnost a utajování zpráv.. ČVUT, Praha, 2004. ISBN 80-01-02863-1.
-
Schneier, B.:. Applied Cryptography. John Wiley & sons, New York, USA, 1996. ISBN 0-471-59756-2.
|