SubjectsSubjects(version: 945)
Course, academic year 2023/2024
   Login via CAS
Coding of Information - AIS510293
Title: Kódování informací
Guaranteed by: Institute of Information Studies and Librarianship (21-UISK)
Faculty: Faculty of Arts
Actual: from 2019
Semester: winter
Points: 0
E-Credits: 4
Examination process: winter s.:
Hours per week, examination: winter s.:2/1, Ex [HT]
Capacity: unknown / unknown (unknown)
Min. number of students: unlimited
4EU+: no
Virtual mobility / capacity: no
Key competences:  
State of the course: not taught
Language: Czech
Teaching methods: full-time
Teaching methods: full-time
Level:  
Is provided by: AIS520006
Note: course can be enrolled in outside the study plan
enabled for web enrollment
can be fulfilled in the future
Guarantor: prof. RNDr. Jiří Ivánek, CSc.
Schedule   Noticeboard   
Annotation -
Last update: UISIVANE (01.10.2018)
The aim of the subject is to get students acquainted with basic types of codes for efective information storing and transmission including its secrecy. The main topics are: entropic coding of information sources, autorepairing codes, principles of text, audio, and visual data compression, basic cryptographic methods (classical substitutional ciphers and their cryptoanalysis, modern cipher standards DES, AES, RSA-method for public key cryptograghy).
Course completion requirements - Czech
Last update: UISIVANE (03.09.2014)
  1. Úspěšné absolvování průběžného testu.
  2. Prezentace referátu.
  3. Ústní zkouška.
Literature - Czech
Last update: PhDr. Blanka Vorlíčková, Ph.D. (07.06.2010)
Jiroušek, R. - Ivánek, J. - Máša, P. - Toušek, J. - Vaněk, N.: Principy digitální komunikace. LEDA, Praha 2006, 309 str.
Ivánek, J.: Vybrané kapitoly z kódování informací. Elektronický studijní text ÚISK FF KU, Praha 2007, 78 str.

Syllabus -
Last update: UISIVANE (16.11.2011)

Contents:


1. Basic notions of information theory
1.1. Information source
1.2. Measure of information and entropy

2. Source coding
2.1. Basic types of codes
2.2. Optimal code
2.3. Error-correction codes
2.4. Limits of messages transmission

3. Data compression
3.1. Text compression 
3.2. Principles of audio compression 
3.3. Principles of image compression 

4. Basic methods of cryptography
4.1. Substitution
4.2. Cryptoanalysis of Vigenere's cipher
4.3. Encryption standard DES
4.4. New encryption standard AES

5. Public key cryptosystems
5.1 Principles of RSA method
5.2 Determining of public and private keys
5.3 Other public key cryptosystems

 
Charles University | Information system of Charles University | http://www.cuni.cz/UKEN-329.html