FI:PV079 Applied Cryptography - Course Information
PV079 Applied CryptographyFaculty of Informatics
- Extent and Intensity
- 1/3. 4 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Petr Švéda (assistant)
- doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications - Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
- ! P079 Applied Cryptography
It is recommended to register this course after a cryptography course (M024 or I054). It is also suggested to have PV017.
Both the course and the final exam are in English.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- Fields of study the course is directly associated with
- Informatics (programme FI, B-IN)
- Informatics (programme FI, M-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-SS)
- Information Technology (programme FI, B-IN)
- Course objectives
- This course is aimed at students of a cryptography course who wish to explore selected topics in cryptography in a greater depth, with a particular focus on cryptography deployment issues, standards and applications. The course enhances students' working experience with up-to-date cryptosystems, and enables them to deploy cryptography effectively.
- Topics depend on recent developments in the area, but usually cover:
- Relations of symmetric and asymmetric cryptography.
- Hash functions and their applications.
- Digital signatures, MAC.
- Cryptographic protocols, entity authentication.
- Public key infrastructure, certification.
- Trust, electronic and/vs. real relations.
- E-commerce security, payment systems.
- Hardware protection of (cryptographic) secrets.
- Patents and standards.
- State restrictions and cryptology.
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997. xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996. xxiii, 758. ISBN 0471128457. info
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999. xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- Final "open book" exam accounts for 50% and assignments also for 50 % of the final grade. Both the course and the final exam are in English.
- Language of instruction
- Further Comments
- The course is taught annually.
The course is taught: every week.
- Listed among pre-requisites of other courses
- Teacher's information