PřF:M8870 Cryptography - Course Information
M8870 Cryptography
Faculty of ScienceSpring 2002
- Extent and Intensity
- 2/1/0. 5 credit(s). Type of Completion: zk (examination).
- Teacher(s)
- prof. RNDr. Jan Paseka, CSc. (lecturer)
- Guaranteed by
- prof. RNDr. Jan Paseka, CSc.
Department of Mathematics and Statistics – Departments – Faculty of Science
Contact Person: prof. RNDr. Jan Paseka, CSc. - Prerequisites
- M1110 Linear algebra I
Linear algebra Mathematical analysis I, II Probability theory - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 6 fields of study the course is directly associated with, display
- Course objectives
- Introduction.
A very abstract summary.
History.
Outline of the course.
Cryptosystems and their application in computer science.
Basic principles.
Breaking a cryptosystem.
Perfect secrecy.
The one time-pad and linear shift-register sequences.
The one time-pad.
The insecurity of linear shift register sequences.
One-way functions.
Informal approach; the password problem.
Using NP-hard problems as cryptosystems.
The Data Encryption Standard (DES).
The discrete logarithm.
Public key cryptosystems.
The idea of a trapdoor function.
The Rivest-Shamir-Adleman (RSA) system.
A public-key system based on the discrete logarithm.
Authentication and digital signatures. Authentication in a communication system. Using public key networks to send signed messages. Two-party protocols. Multi-party protocols.
Randomized encryption. - Literature
- Porubský, Š. a Grošek, O. Šifrovanie. Algoritmy, Metódy, Prax. Grada, Praha 1992.
- Welsh, Dominic.: Codes and Cryptography.Oxford University Press,M New York 1989. ISBN
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471128457. info
- SALOMAA, Arto. Public-key cryptography. 2nd ed. Berlin: Springer, 1996, x, 271. ISBN 3540613560. info
- Language of instruction
- Czech
- Further Comments
- The course is taught once in two years.
The course is taught: every week.
- Enrolment Statistics (recent)
- Permalink: https://is.muni.cz/course/sci/spring2002/M8870