SubjectsSubjects(version: 964)
Course, academic year 2024/2025
   Login via CAS
Theoretic Cryptography - NMMB305
Title: Teoretická kryptografie
Guaranteed by: Department of Algebra (32-KA)
Faculty: Faculty of Mathematics and Physics
Actual: from 2018
Semester: winter
E-Credits: 6
Hours per week, examination: winter s.:3/1, C+Ex [HT]
Capacity: unlimited
Min. number of students: unlimited
4EU+: no
Virtual mobility / capacity: no
State of the course: not taught
Language: Czech
Teaching methods: full-time
Guarantor: Mgr. Robert El Bashir, Ph.D.
Class: M Bc. MMIB
Classification: Mathematics > Algebra
Incompatibility : NMIB005, NMMB308
Interchangeability : NMIB005, NMMB308
Is incompatible with: NMMB336, NMMB308, NMMB335, NMMB307
Is interchangeable with: NMMB335, NMMB336, NMMB307, NMIB005, NMMB308
Annotation -
Required course for bachelor's program in Information security. The course describes basic methods and problems of cryptography. One by one, basic cryptographic primitives (modules) are described. The course also contains implementation and overview of the most important protocols.
Last update: G_M (16.05.2012)
Course completion requirements - Czech

Zápočet student získá za systematickou práci v semestru nebo vyřešení zápočtové úlohy v rámci zkoušky

Last update: Žemlička Jan, doc. Mgr. et Mgr., Ph.D. (13.10.2017)
Literature -

Neal Koblitz: Algebraic aspects of cryptography, Springer Verlag 1998;

Douglas R. Stinson: Cryptography: Theory and practice, Chapman and Hall, Boca Raton, 2006.

Serge Vaudenay, A classical introduction to cryptography: applications for communications security, Springer, New York, 2006.

Michael Luby: Pseudorandomness and cryptographic applications, Princeton Univ Pr. Princeton 1996.

Last update: T_KA (14.05.2012)
Requirements to the exam - Czech

Zkouška je ústní. Požadavky ke zkoušce odpovídají sylabu předmětu v rozsahu, který byl prezentován na přednášce.

Last update: El Bashir Robert, Mgr., Ph.D. (12.10.2017)
Syllabus -

Shannon theory, symmetric cryptography, linear reccuring requences (period, spectrum, randomness criteria, Berlekamp-Massey algorithm), Boolean functions (spectrum, correlation matrix, difference propagation, cryptographic criteria), block cipher construction, hash function, public-key cryptography, signature scheme.

Last update: Žemlička Jan, doc. Mgr. et Mgr., Ph.D. (22.08.2012)
 
Charles University | Information system of Charles University | http://www.cuni.cz/UKEN-329.html