FI:I054 Cryptography and C.Protocols - Course Information
I054 Coding, Cryptography and Cryptographic Protocols
Faculty of InformaticsAutumn 2000
- Extent and Intensity
- 2/1. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
- Teacher(s)
- prof. RNDr. Jozef Gruska, DrSc. (lecturer)
prof. Dr. phil. Jakub Mácha, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Mojmír Křetínský, CSc.
Department of Computer Science – Faculty of Informatics
Contact Person: prof. RNDr. Jozef Gruska, DrSc. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Informatics (programme FI, B-IN)
- Informatics (programme FI, M-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, M-SS)
- Information Technology (programme FI, B-IN)
- Syllabus
- Coding theory and modern cryptography are rich on deep, elegant, interesting and practically very important ideas, methods, and systems. Main concepts of modern cryptography are closely connected with fundamental concepts of theoretical informatics. Current cryptohraphy and its methods and systems are of key importance for modern communication and information systems. Basic knowledge of coding methods and of modern cryptography are necessary for each graduate of informatics. Presentaion of cryptographical systems will be accompanied by interesting illustrations and stories from a very rich history of cryptography
- Basic concepts of coding theory
- Linear codes
- Cyclic codes
- Classical cryptography
- Public-key cryptosystems
- RSA cryptosystems and digital signatures
- Integer factorization and prime recognition
- Other cryptosystems
- DES and AES cryptosystems
- Basic cryptographic protocols
- Zero-knowledge protocols
- Steganography
- From crypto-theory ro crypto-practice
- Quantum key distribution
- Quantum cryptographic protocols
- Literature
- Stinson Douglas R. Cryptography, Theory and Practice, CRC Press, 1995, 434s, ISBN 0-8493-8521-0
- Gruska, Jozef. Quantum computing, London, McGraw-Hill, 1999, 450 s, ISBN 0-07-709503-0
- GRUSKA, Jozef. Foundations of computing. London: International Thompson Computer Press, 1997, xv, 716 s. ISBN 1-85032-243-0. info
- SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996, xxiii, 758. ISBN 0471128457. info
- SALOMAA, Arto. Public-key cryptography. 2nd ed. Berlin: Springer, 1996, x, 271. ISBN 3540613560. info
- Language of instruction
- Czech
- Further Comments
- The course is taught annually.
The course is taught: every week.
- Enrolment Statistics (Autumn 2000, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2000/I054