This course is aimed at students of a cryptography course who wish
to explore selected topics in cryptography in a greater depth,
with a particular focus on cryptography deployment issues,
standards and applications. The course enhances students' working
experience with up-to-date cryptosystems, and enables them to
deploy cryptography effectively.
Topics depend on recent developments in the area, but usually cover:
Relations of symmetric and asymmetric cryptography.
Hash functions and their applications.
Digital signatures, MAC.
Cryptographic protocols, entity authentication.
Public key infrastructure, certification.
Trust, electronic and/vs. real relations.
E-commerce security, payment systems.
Hardware protection of (cryptographic) secrets.
Patents and standards.
State restrictions and cryptology.
MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997. xiii, 780. ISBN 0-8493-8523-7. info
SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996. xxiii, 758. ISBN 0471128457. info
STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999. xvii, 569. ISBN 0-13-869017-0. info
Assessment methods (in Czech)
Final "open book" exam accounts for 50% and assignments also for 50 %
of the final grade. Both the course and the final exam are in English.
Language of instruction
The course is taught annually.
The course is taught: every week.