I054 Coding, Cryptography and Cryptographic Protocols

Faculty of Informatics
Autumn 2000
Extent and Intensity
2/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
prof. RNDr. Jozef Gruska, DrSc. (lecturer)
prof. Dr. phil. Jakub Mácha, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Mojmír Křetínský, CSc.
Department of Computer Science – Faculty of Informatics
Contact Person: prof. RNDr. Jozef Gruska, DrSc.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Coding theory and modern cryptography are rich on deep, elegant, interesting and practically very important ideas, methods, and systems. Main concepts of modern cryptography are closely connected with fundamental concepts of theoretical informatics. Current cryptohraphy and its methods and systems are of key importance for modern communication and information systems. Basic knowledge of coding methods and of modern cryptography are necessary for each graduate of informatics. Presentaion of cryptographical systems will be accompanied by interesting illustrations and stories from a very rich history of cryptography
  • Basic concepts of coding theory
  • Linear codes
  • Cyclic codes
  • Classical cryptography
  • Public-key cryptosystems
  • RSA cryptosystems and digital signatures
  • Integer factorization and prime recognition
  • Other cryptosystems
  • DES and AES cryptosystems
  • Basic cryptographic protocols
  • Zero-knowledge protocols
  • Steganography
  • From crypto-theory ro crypto-practice
  • Quantum key distribution
  • Quantum cryptographic protocols
Literature
  • Stinson Douglas R. Cryptography, Theory and Practice, CRC Press, 1995, 434s, ISBN 0-8493-8521-0
  • Gruska, Jozef. Quantum computing, London, McGraw-Hill, 1999, 450 s, ISBN 0-07-709503-0
  • GRUSKA, Jozef. Foundations of computing. Online. London: International Thompson Computer Press, 1997. xv, 716 s. ISBN 1-85032-243-0. [citováno 2024-04-24] info
  • SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. Online. New York: John Wiley & Sons, 1996. xxiii, 758. ISBN 0471128457. [citováno 2024-04-24] info
  • SALOMAA, Arto. Public-key cryptography. Online. 2nd ed. Berlin: Springer, 1996. x, 271. ISBN 3540613560. [citováno 2024-04-24] info
Language of instruction
Czech
Further Comments
The course is taught annually.
The course is taught: every week.
The course is also listed under the following terms Autumn 1996, Autumn 1997, Autumn 1998, Autumn 1999, Autumn 2001.
  • Enrolment Statistics (Autumn 2000, recent)
  • Permalink: https://is.muni.cz/course/fi/autumn2000/I054