Lecturer(s)


Mlýnek Jaroslav, doc. RNDr. CSc.

Course content

1. Main reasons of electronic information securing a/ obligations arisen from valid legislative b/ commitments to other companies c/ own interests of companies 2. Cryptography  instrument to the ensuring of confidentiality, integrity and authenticity of information a/ basic definition (cryptography, cryptoanalysis, cryptology) b/ principle of encryption (plain text, cipher text, key) c/ encryption x coding 3. Introduction to number theory a/ fundamental terms b/ modular arithmetic 4. Classical cryptography a/ the substitution cipher b/ the transposition cipher c/ the stream cipher d/ the block cipher 5. Symmetric cipher a/ basic principle of encryption b/ a Vernam cipher 6. DES (Data Encryption Standard), TripleDES 7. a/ AES (Advanced Encryption Standard Advanced Encryption Standard) b/ IDEA (International Data Encryption Algorithm) 8. Asymmetric cipher a/ basic principle of encryption b/ RSA cipher c/ other asymmetric ciphers 9. Digital signature a/ principle of digital signature b/ DSA (Digital Signature Algorithm) c/ most often use variations of digital signature 10. Digital signature and electronic signature, Electronic signature act n. 227/2000 11. Management of public keys of asymmetric encryption, a public key certificate, a certification authority (CA) 12. The principle of elliptic curve use in cryptography 13. Basic principles of coding

Learning activities and teaching methods

Monological explanation (lecture, presentation,briefing)
 Class attendance
 42 hours per semester
 Preparation for credit
 18 hours per semester
 Home preparation for classes
 20 hours per semester
 Preparation for exam
 30 hours per semester
 Semestral paper
 10 hours per semester

Learning outcomes

The aim of a course is to inform students about the basic cryptography tools and their usage during securing electronic information. Students will be acquainted with needs of information securing and with possibilities of cryptography tools. Lessons will be focused on the chosen parts of number theory, modular arithmetic, special mathematics functions, cipher systems, digital and electronic signature including management of public key of asymmetric encryption (a certificate of public key and activities of certificate authority). The basic principles of coding theory are explained as well.
Cryptography basic methods and use of these methods to security of electronic information.

Prerequisites

Basic course of higher mathematics

Assessment methods and criteria

Combined examination
Credit: participation on seminars Exam: written + oral part

Recommended literature


Adámek, J.:. Kódování.. SNTL, Praha, 1989.

Grošek, O., Porubský, Š.:. Šifrovanie  algoritmy, metódy, prax.. Grada, Praha, 1992. ISBN 8086119777.

Menezes, A.  Oorschot, P.  Vanstone, S.:. Handbook of Applied Cryptography.. Boca Raton, USA, CRC Press, 2001. ISBN 9788025115114.

Mlýnek, J.:. Zabezpečení obchodních informací. Computer Press, Brno, 2007. ISBN 9788025115114.

Přibyl , J.:. Informační bezpečnost a utajování zpráv.. ČVUT, Praha, 2004. ISBN 8001028631.

Schneier, B.:. Applied Cryptography. John Wiley & sons, New York, USA, 1996. ISBN 0471597562.
