PV079 Applied Cryptography

Faculty of Informatics
Autumn 2014
Extent and Intensity
1/1/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Jiří Kůr, Ph.D. (assistant)
RNDr. Andrij Stecko, Ph.D. (assistant)
RNDr. Filip Jurnečka, Ph.D. (assistant)
Mgr. Marek Sýs, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Wed 8:00–9:50 A318
Prerequisites
IV054 Cryptography and C.Protocols || PřF:M0170 Cryptography || SOUHLAS
It is recommended to register this course after a cryptography course (M0170 or IV054), and it is also useful to have PV157 prior to this course.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 38 fields of study the course is directly associated with, display
Course objectives
At the end of the course students should be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of security and efficiency.
Syllabus
  • This course explores the issues of applied cryptography issues, and topics cover: Relations of symmetric and asymmetric cryptography.
  • Hash functions and their applications.
  • Digital signatures, MAC.
  • Non-repudiation.
  • Cryptographic protocols, entity authentication.
  • Public key infrastructure, certification.
  • Trust, electronic and/vs. real relations.
  • E-commerce security, payment systems.
  • Hardware protection of (cryptographic) secrets.
  • Patents and standards.
  • Application of cryptography in selected systems - wireless sensor networks, smartcards, privacy enhancing technologies.
Literature
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471117099. info
Teaching methods
lecture, assignments (home work) of applied nature
Assessment methods
Final "open book" exam accounts for 50% and assignments also for 50% of the final grade. Both the course and the final exam are in English.
Language of instruction
English
Follow-Up Courses
Further Comments
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Autumn 2005, Autumn 2006, Autumn 2007, Autumn 2008, Autumn 2009, Autumn 2010, Autumn 2011, Autumn 2012, Autumn 2013, Autumn 2015, Autumn 2016, Autumn 2017, Autumn 2018, Autumn 2019, Autumn 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.
  • Enrolment Statistics (Autumn 2014, recent)
  • Permalink: https://is.muni.cz/course/fi/autumn2014/PV079