SubjectsSubjects(version: 945)
Course, academic year 2023/2024
   Login via CAS
Applied Cryptography 2 - NMMB302
Title: Aplikovaná kryptografie 2
Guaranteed by: Department of Algebra (32-KA)
Faculty: Faculty of Mathematics and Physics
Actual: from 2022
Semester: summer
E-Credits: 3
Hours per week, examination: summer s.:2/0, Ex [HT]
Capacity: unlimited
Min. number of students: unlimited
4EU+: no
Virtual mobility / capacity: no
State of the course: not taught
Language: Czech
Teaching methods: full-time
Teaching methods: full-time
Guarantor: Dr. rer. nat. Faruk Göloglu
Class: M Bc. MMIB
M Bc. MMIB > Povinně volitelné
M Bc. MMIT
M Bc. MMIT > Povinně volitelné
Classification: Mathematics > Algebra
Co-requisite : NMMB301
Incompatibility : NMIB007
Interchangeability : NMIB007
Is pre-requisite for: NMMB349
Is interchangeable with: NMIB007
Annotation -
Last update: G_M (16.05.2012)
Required course for bachelor's program in Information security. Continuation of NMMB301.
Course completion requirements - Czech
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (10.06.2019)

Předmět je zakončen ústní zkouškou.

Literature -
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (24.08.2012)

Shafi Goldwasser, Mihir Bellare: Lecture Notes on Cryptography, 2008, http://cseweb.ucsd.edu/~mihir/papers/gb.pdf

A. Menezes, P. van Oorschot, and S. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (http://www.cacr.math.uwaterloo.ca/hac)

W. Mao: Modern Cryptography: Theory and Practice, Prentice Hall PTR 2003

Douglas R. Stinson: Cryptography - Theory and Practice, CRC Press, 1995

Requirements to the exam - Czech
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (10.06.2019)

Zkouška má ústní formu. Její požadavky odpovídají obsahu přednesené látky.

Syllabus -
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (26.09.2012)

Asymmetric cryptographic algorithms - principles, applications.

Public key encryption algorithms.

Signature algorithms and schemes, schemes with special properties.

Protocols for key management - principles, the main protocols.

Identification schemes and protocols - basic schemes, properties and uses.

Secret sharing algorithms.

Special schemes and protocols: electronic payments, electronic elections, Traitor tracing.

Non-traditional use of cryptography: coin flipping, electronic poker, secure computing.

 
Charles University | Information system of Charles University | http://www.cuni.cz/UKEN-329.html