M8870 Cryptography

Faculty of Science
Spring 2002
Extent and Intensity
2/1/0. 5 credit(s). Type of Completion: zk (examination).
Teacher(s)
prof. RNDr. Jan Paseka, CSc. (lecturer)
Guaranteed by
prof. RNDr. Jan Paseka, CSc.
Department of Mathematics and Statistics – Departments – Faculty of Science
Contact Person: prof. RNDr. Jan Paseka, CSc.
Prerequisites
M1110 Linear algebra I
Linear algebra Mathematical analysis I, II Probability theory
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 6 fields of study the course is directly associated with, display
Course objectives
Introduction. A very abstract summary. History. Outline of the course. Cryptosystems and their application in computer science. Basic principles. Breaking a cryptosystem. Perfect secrecy. The one time-pad and linear shift-register sequences. The one time-pad. The insecurity of linear shift register sequences. One-way functions. Informal approach; the password problem. Using NP-hard problems as cryptosystems. The Data Encryption Standard (DES). The discrete logarithm. Public key cryptosystems. The idea of a trapdoor function. The Rivest-Shamir-Adleman (RSA) system. A public-key system based on the discrete logarithm.
Authentication and digital signatures. Authentication in a communication system. Using public key networks to send signed messages. Two-party protocols. Multi-party protocols.
Randomized encryption.
Literature
  • Porubský, Š. a Grošek, O. Šifrovanie. Algoritmy, Metódy, Prax. Grada, Praha 1992.
  • Welsh, Dominic.: Codes and Cryptography.Oxford University Press,M New York 1989. ISBN
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471128457. info
  • SALOMAA, Arto. Public-key cryptography. 2nd ed. Berlin: Springer, 1996, x, 271. ISBN 3540613560. info
Language of instruction
Czech
Further Comments
The course is taught once in two years.
The course is taught: every week.

  • Enrolment Statistics (recent)
  • Permalink: https://is.muni.cz/course/sci/spring2002/M8870