SubjectsSubjects(version: 849)
Course, academic year 2019/2020
   Login via CAS
Applied Cryptography 2 - NMMB302
Title in English: Aplikovaná kryptografie 2
Guaranteed by: Department of Algebra (32-KA)
Faculty: Faculty of Mathematics and Physics
Actual: from 2019
Semester: summer
E-Credits: 3
Hours per week, examination: summer s.:2/0 Ex [hours/week]
Capacity: unlimited
Min. number of students: unlimited
State of the course: taught
Language: Czech
Teaching methods: full-time
Guarantor: RNDr. Miroslav Šedivý
Class: M Bc. MMIB
M Bc. MMIB > Povinně volitelné
M Bc. MMIT > Povinně volitelné
Classification: Mathematics > Algebra
Co-requisite : NMMB301
Incompatibility : NMIB007
Interchangeability : NMIB007
Is pre-requisite for: NMMB349
Annotation -
Last update: G_M (16.05.2012)
Required course for bachelor's program in Information security. Continuation of NMMB301.
Course completion requirements - Czech
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (11.06.2019)

Předmět je zakončen ústní zkouškou.

Literature -
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (24.08.2012)

Shafi Goldwasser, Mihir Bellare: Lecture Notes on Cryptography, 2008,

A. Menezes, P. van Oorschot, and S. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (

W. Mao: Modern Cryptography: Theory and Practice, Prentice Hall PTR 2003

Douglas R. Stinson: Cryptography - Theory and Practice, CRC Press, 1995

Requirements to the exam - Czech
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (11.06.2019)

Zkouška je ústní. Požadavky ke zkoušce odpovídají sylabu předmětu v rozsahu, který byl prezentován na přednášce.

Syllabus -
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (26.09.2012)

Asymmetric cryptographic algorithms - principles, applications.

Public key encryption algorithms.

Signature algorithms and schemes, schemes with special properties.

Protocols for key management - principles, the main protocols.

Identification schemes and protocols - basic schemes, properties and uses.

Secret sharing algorithms.

Special schemes and protocols: electronic payments, electronic elections, Traitor tracing.

Non-traditional use of cryptography: coin flipping, electronic poker, secure computing.

Charles University | Information system of Charles University |