IV054 Coding, Cryptography and Cryptographic Protocols

Fakulta informatiky
podzim 2021
Rozsah
2/1/2. 5 kr. (plus ukončení). Doporučované ukončení: zk. Jiná možná ukončení: z.
Vyučováno prezenčně.
Vyučující
prof. RNDr. Jozef Gruska, DrSc. (přednášející)
RNDr. Lukáš Boháč (cvičící)
RNDr. Matej Pivoluska, Ph.D. (cvičící)
Mgr. Libor Caha, PhD. (pomocník)
Mgr. Luděk Matyska (pomocník)
Mgr. Henrieta Micheľová (pomocník)
Mgr. Roman Oravec (pomocník)
Mgr. Anh Minh Tran (pomocník)
Garance
prof. RNDr. Jozef Gruska, DrSc.
Katedra teorie programování – Fakulta informatiky
Kontaktní osoba: prof. RNDr. Jozef Gruska, DrSc.
Dodavatelské pracoviště: Katedra teorie programování – Fakulta informatiky
Rozvrh
St 15. 9. až St 8. 12. St 10:00–11:50 D2
  • Rozvrh seminárních/paralelních skupin:
IV054/EN: St 15. 9. až St 8. 12. St 14:00–15:50 B410, M. Pivoluska
IV054/SK: St 15. 9. až St 8. 12. St 18:00–19:50 A318, M. Pivoluska
Předpoklady
! NOW ( IA174 Fundaments of Cryptography ) && ! IA174 Fundaments of Cryptography
Basics of linear algebra and o discrete mathematics, see also Appendix in http://www.fi.muni.cz/usr/gruska/crypto21
Omezení zápisu do předmětu
Předmět je nabízen i studentům mimo mateřské obory.
Mateřské obory/plány
předmět má 72 mateřských oborů, zobrazit
Cíle předmětu
The lecture deals with the basic methods to solve three key problems of the transmission of information - transmission, storing, hiding. All three problems are of large practical importance and their solutions are often based on elegant and deep theoretical results. To verify, for ambitious students, their capability to work hard to be successful in very competitive informatics + mathematics environment.
Výstupy z učení
On successful completion of the course students should be able to: understand problems of the theory of error-correcting codes and their solutions; understand basic principles and results of the theory of secure communications; principles and problems of basic cryptosystems for encryption (both secret and public key), digital signatures and authentication; methods to create core cryptographic protocols primitives; analyze and practically use cryptosystems and such primitives as eliptic curves, hash-functions and secret-sharing methods. Basic methods for hiding information presented in steganography and watermarking. Finally, (s)he gets familiar in using quantum information processing tools and laws in general and in application to cryptography in particular. He gets also familiar with development and use cryptographic machines and with history of cryptography be experienced in methods of quantum cryptography and steganography
Osnova
  • Coding theory and modern cryptography are rich on deep, elegant, interesting and practically very important ideas, methods, and systems. Main concepts of modern cryptography are closely connected with fundamental concepts of theoretical informatics. Current cryptography and its methods and systems are of key importance for modern communication and information systems. Basic knowledge of coding methods and of modern cryptography are necessary for each graduate of informatics.
  • Lecture will be rich also on examples and experiences from a very rich and interesting history of cryptography.
  • Basic concepts of coding theory and linear codes
  • Cyclic and channel codes, very modern coding methods
  • Classical cryptography
  • Public-key cryptosystems, knapsack, RSA, public key exchange
  • Other cryptosystems and cryptographic primitives
  • Digital signatures
  • Elliptic curves in cryptography and integer factorization
  • Basic cryptographic protocols
  • Authentication, identification, secret sharing, e-commerce
  • Steganography and watermarking
  • From crypto-theory to crypto-practice
  • Quantum cryptographic protocols
  • Machines and history of cryptography
Literatura
  • GRUSKA, Jozef. Quantum computing. London: McGraw-Hill Companies. xv, 439. ISBN 0077095030. 1999. info
  • GRUSKA, Jozef. Foundations of computing. London: International Thompson Computer Press. xv, 716 s. ISBN 1-85032-243-0. 1997. info
  • SCHNEIER, Bruce. Applied cryptography : protocols, algorithms, and source code in C. New York: John Wiley & Sons. xxiii, 758. ISBN 0471128457. 1996. info
  • SALOMAA, Arto. Public-key cryptography. 2nd ed. Berlin: Springer. x, 271. ISBN 3540613560. 1996. info
  • STINSON, Douglas Robert. Cryptography :theory and practice. Boca Raton: CRC Press. 434 s. ISBN 0-8493-8521-0. 1995. info
Výukové metody
Lectures and homework
Metody hodnocení
Oral exam. Each student will get 5 questions. Number of question a student has to respond will depend on the number of points received for homeworks. Each student will get automatically A in case (s)he received number of points from exercises <= 85% of MAX - maximal number of points a studen got from exercises. Automatically a student gets B, with an easy way to get A, in case the number of points received is in interval (75,85)% og Max. a ....
Vyučovací jazyk
Angličtina
Informace učitele
http://www.fi.muni.cz/usr/gruska/crypto19
Teaching materials: 1. Detailed slides of all lectures. Each chapter will consists of a (i) short Prologue, (ii) basic materials and an (iii) Appendix - for much demanding students 2. Appendix of fundamental discrete math and linear algebra - 45 pages 3. Two lecture notes of solved examples (at least 1000 in each one) 4. Posted solutions of homeworks.
Další komentáře
Studijní materiály
Předmět je vyučován naposledy.
Výukové materiály (včetně průsvitek) výhradně v angličtině.
Nachází se v prerekvizitách jiných předmětů
Předmět je zařazen také v obdobích podzim 2002, podzim 2003, podzim 2004, podzim 2005, podzim 2006, podzim 2007, podzim 2008, podzim 2009, podzim 2010, podzim 2011, podzim 2012, podzim 2013, podzim 2014, podzim 2015, podzim 2016, podzim 2017, podzim 2018, podzim 2019, podzim 2020.
  • Statistika zápisu (nejnovější)
  • Permalink: https://is.muni.cz/predmet/fi/podzim2021/IV054