P079 Applied Cryptography

Faculty of Informatics
Autumn 2001
Extent and Intensity
1/3. 4 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Timetable
Thu 14:00–15:50 B204
Prerequisites
M024 Cryptography || I054 Cryptography and C.Protocols
Can be registered only after a cryptography course (M024 or I054). It is also suggested to have P017 Information Technology Security. Related courses: P018 Seminar on Information Technology Security, P046 Information Systems and the Law and P080 Data Protection and Information Privacy.
Both the course and the final exam are in English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Topics depend on recent developments in the area, but usually cover:
  • Relations of symmetric and asymmetric cryptography.
  • Hash functions and their applications.
  • Digital signatures, MAC.
  • Non-repudiation.
  • Cryptographic protocols, entity authentication.
  • Public key infrastructure, certification.
  • Trust, electronic and/vs. real relations.
  • E-commerce security, payment systems.
  • Hardware protection of (cryptographic) secrets.
  • Patents and standards.
  • State restrictions and cryptology.
Literature
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471128457. info
  • STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
Assessment methods (in Czech)
Final "open book" exam accounts for 50% and assignments also for 50 % of the final grade. Both the course and the final exam are in English.
Language of instruction
English
Further Comments
The course is taught annually.
Teacher's information
http://www.fi.muni.cz/usr/matyas/lecture/p079.html
The course is also listed under the following terms Autumn 1997, Autumn 1998, Autumn 1999, Autumn 2000.

P079 Applied Cryptography

Faculty of Informatics
Autumn 2000
Extent and Intensity
1/3. 4 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Prerequisites
M024 Cryptography || I054 Cryptography and C.Protocols
It is suggested to have P017 Information Technology Security. Related courses: P018 Seminar on Information Technology Security, P046 Information Systems and the Law and P080 Data Protection and Information Privacy.
School-year 2000/2001: both the course and the final exam are in English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Topics will depend on developments in the area, but should usually involve:
  • Relations of symmetric and asymmetric cryptography.
  • Digital signatures, MAC.
  • Entity authentication.
  • Applications of hash functions.
  • Non-repudiation.
  • Cryptographic protocols.
  • Public key infrastructure, certification.
  • Trust, electronic and/vs. real relations and dependencies.
  • E-commerce security.
  • Application of cryptography in electronic publishing.
  • Patents and standards.
  • State restrictions and cryptographic applications.
  • School-year 2000/2001: both the course and the final exam are in English.
Literature
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471128457. info
Assessment methods (in Czech)
Obvykle písemná zkouška typu "open book" a řešení bodovaných úkolů během semestru. School-year 2000/2001: both the course and the final exam are in English.
Language of instruction
English
Further Comments
The course is taught annually.
The course is taught: every week.
Teacher's information
http://www.fi.muni.cz/usr/matyas/lecture/p079.html
The course is also listed under the following terms Autumn 1997, Autumn 1998, Autumn 1999, Autumn 2001.

P079 Applied Cryptography

Faculty of Informatics
Autumn 1999
Extent and Intensity
1/2. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
prof. PhDr. Karel Pala, CSc.
Department of Machine Learning and Data Processing – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Prerequisites
M024 Cryptography || I054 Cryptography and C.Protocols
Prerequisites: M024 or I054. Also, P017 is strongly recommended.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Topics will depend on developments in the area, but should usually involve:
  • Relations of symmetric and asymmettric cryptography.
  • Digital signatures, MAC.
  • Entity authentication.
  • Applications of hash functions.
  • Non-repudiation.
  • Symmetric cryptography protocols.
  • Asymmetric cryptography protocols.
  • Public key infrastructure, certification.
  • Trust, electronic and/vs. real relations and dependencies.
  • Secure electronic commerce.
  • Application of cryptography in electronic publishing.
  • Patents and standards.
  • State restrictions and cryptographic applications.
Literature
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471128457. info
Assessment methods (in Czech)
Obvykle písemná zkouška typu "open book" a řešení bodovaných úkolů během semestru. Kurz z velké části probíhá korenspondenčně s využitím Internetu, doplněn blokovou výukou.
Language of instruction
Czech
Further Comments
The course is taught annually.
The course is taught: every week.
Teacher's information
http://www.fi.muni.cz/usr/matyas/lecture/p079.html
The course is also listed under the following terms Autumn 1997, Autumn 1998, Autumn 2000, Autumn 2001.

P079 Applied Cryptography

Faculty of Informatics
Autumn 1998
Extent and Intensity
1/2. 3 credit(s). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Prerequisites
M024 Cryptography || I054 Cryptography and Cryptographic Protocols
Prerequisites: M024 or I054. Also, P017 is strongly recommended.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Topics will depend on developments in the area, but should usually involve:
  • Relations of symmetric and asymmettric cryptography.
  • Digital signatures, MAC.
  • Entity authentication.
  • Applications of hash functions.
  • Non-repudiation.
  • Symmetric cryptography protocols.
  • Asymmetric cryptography protocols.
  • Public key infrastructure, certification.
  • Trust, electronic and/vs. real relations and dependencies.
  • Secure electronic commerce.
  • Application of cryptography in electronic publishing.
  • Patents and standards.
  • State restrictions and cryptographic applications.
Language of instruction
Czech
Further comments (probably available only in Czech)
The course is taught annually.
The course is taught: every week.
Teacher's information
http://www.fi.muni.cz/usr/matyas/lecture/p079.html
The course is also listed under the following terms Autumn 1997, Autumn 1999, Autumn 2000, Autumn 2001.

P079 Applied Cryptography

Faculty of Informatics
Autumn 1997
Extent and Intensity
1/2. 3 credit(s). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Prerequisites
M024 Cryptography || I054 Cryptography and Cryptographic Protocols
Prerequisites: M024 or I054. Also, P017 is strongly recommended.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Topics will depend on developments in the area, but should usually involve:
  • Relations of symmetric and asymmettric cryptography.
  • Digital signatures, MAC.
  • Entity authentication.
  • Applications of hash functions.
  • Non-repudiation.
  • Symmetric cryptography protocols.
  • Asymmetric cryptography protocols.
  • Public key infrastructure, certification.
  • Trust, electronic and/vs. real relations and dependencies.
  • Secure electronic commerce.
  • Application of cryptography in electronic publishing.
  • Patents and standards.
  • State restrictions and cryptographic applications.
Language of instruction
Czech
Teacher's information
http://www.fi.muni.cz/usr/matyas/lecture/p079.html
The course is also listed under the following terms Autumn 1998, Autumn 1999, Autumn 2000, Autumn 2001.
  • Enrolment Statistics (recent)