FI:PV181 Lab - security, appl. crypto I - Course Information

PV181 Laboratory of security and applied cryptography I

Faculty of Informatics
Autumn 2009
Extent and Intensity
0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: z (credit). Other types of completion: k (colloquium).
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
RNDr. Marek Kumpošt, Ph.D. (seminar tutor)
RNDr. Jiří Kůr, Ph.D. (seminar tutor)
RNDr. Václav Lorenc (seminar tutor)
RNDr. Andrij Stecko, Ph.D. (seminar tutor)
RNDr. Petr Švenda, Ph.D. (seminar tutor)
Mgr. Pavel Tuček (seminar tutor)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications - Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Timetable of Seminar Groups
PV181/01: No timetable has been entered into IS. Z. Říha
PV181/02: No timetable has been entered into IS. Z. Říha
Registration to PV181 requires: 1) ability to work independently; 2) long-term interest in IT security (having done another IT security and/or cryptology courses and description of your interest in 3-10 sentences); 3) programming skills (ideally C and Java) under Unix/Linux or Win32; 4) fluent English; 5) team work ability.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
Fields of study the course is directly associated with
there are 44 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand implementation details of cryptographic algortithms and protocols and be able to apply the gained knowledge in practice. At the end of the course students should be able to design and implement cryptographic applications independently.
  • Principles of cryptography and cryptographic standards (symmetrical cryptography, random number generation, hash functions, asymmetrical cryptography, certificates, certification authority, PKI). Using cryptographic libraries in cryptoaplications (OpenSSL, Cryptlib, Microsoft Crypto API, Java). Digital Signatures (CMS/PKCS#7 structure, S/MIME, Czech legislation). Smartcards (using the PC/SC interface to communicate with the smartcards/smartcard readers, APDU commands/replies, Secure Messaging, Javacards and programming of own applications running on smartcards). Electronic passports (principles, access control, reading of data).
  • Handbook of biometrics. Edited by Anil K. Jain - Patrick J. Flynn - Arun A. Ross. New York: Springer, 2008. x, 556. ISBN 9780387710402. info
  • STALLINGS, William. Network security essentials :applications and standards. 2nd ed. Upper Saddle River: Prentice Hall, 2003. xv, 409 s. ISBN 0-13-120271-5. info
  • JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999. 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
Teaching methods
seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 12 homeworks (10 points each). To get the credit (Z) 50% of the points are required.
Language of instruction
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Autumn 2008, Autumn 2010, Autumn 2011, Autumn 2012, Autumn 2013, Autumn 2014, Autumn 2015, Autumn 2016, Autumn 2017, Autumn 2018, Accreditation autumn.
  • Enrolment Statistics (Autumn 2009, recent)
  • Permalink: https://is.muni.cz/course/fi/autumn2009/PV181