SubjectsSubjects(version: 945)
Course, academic year 2014/2015
   Login via CAS
Introduction to Classical and Modern Cryptology - NMMB160
Title: Úvod do klasických a moderních metod šifrování
Guaranteed by: Department of Algebra (32-KA)
Faculty: Faculty of Mathematics and Physics
Actual: from 2013 to 2021
Semester: summer
E-Credits: 3
Hours per week, examination: summer s.:2/0, Ex [HT]
Capacity: unlimited
Min. number of students: unlimited
4EU+: no
Virtual mobility / capacity: no
State of the course: not taught
Language: Czech
Teaching methods: full-time
Teaching methods: full-time
Note: course can be enrolled in outside the study plan
Guarantor: doc. RNDr. Jiří Tůma, DrSc.
Class: M Bc. MMIB
M Bc. MMIB > Doporučené volitelné
M Bc. MMIB > 1. ročník
M Bc. OM
M Bc. OM > Doporučené volitelné
M Bc. OM > 1. ročník
Classification: Mathematics > Algebra
Incompatibility : NALG082
Annotation -
Last update: G_M (16.05.2012)
An elective course for 1st year students of General Mathematics and Information Security.
Literature - Czech
Last update: G_M (27.04.2012)

Robert Churchhouse, Codes and Ciphers - Julius Ceasar, the Enigmea and the internet, Cambridge University Press, 2001,

F.L. Bauer, Decrypted secrets - Methods and Maxims of Cryptography, Springer-Verlag Berlin, Heidelberg, 2000,

Crypto-World, www.mujweb.cz/veda/gcucmp, vydává skupina pro kryptologii Jednoty českých matematiků a fyziků (published by the Group of Cryprology of the Union of Czech mathematicians and physicists)

Jiří Janeček, Odhalená tajemství šifrovacích klíčů minulosti, Naše vojsko 1994

Jiří Přibyl, Jindřich Kodl: Ochrana dat v informatice, ČVUT 1996

Syllabus -
Last update: G_M (27.04.2012)

Cryptology, cryptography, steganography.

Basic concepts - plain text, cipher text, key, cipher systém, code.

History of cryptology. Simple substitution, frequency, bigraphs, trigraphs, pecularities of language.

Polyalphabetic substitution, code book.

Transposition systems, double transposition, transposition boxes, turninig grill, examples.

Periodic key, breaking cryptosystems with a periodic key.

Absolutely secure cryptosystems, relatively secure cryptosystems.

Possibilities for breaking an absolutely secure cryptosystem, repeated use of key.

History, WW I and WW II, Zimmerman's telegram, Enigma, Navajos, Japan.

Generating of (pseudo)random numbers and of prime numbers.

Symmetric cryptography, block ciphers and stream ciphers, modes of block ciphers, key management.

Hash functions.

Assymetric cryptography, RSA, DSA, ECC, weaknesses of RSA.

Digital signature, signature schemes, legislative questions, standards and norms.

Literature:

Robert Churchhouse, Codes and Ciphers - Julius Ceasar, the Enigmea and the internet, Cambridge University Press, 2001,

F.L. Bauer, Decrypted secrets - Methods and Maxims of Cryptography, Springer-Verlag Berlin, Heidelberg, 2000,

Crypto-World, www.mujweb.cz/veda/gcucmp, vydává skupina pro kryptologii Jednoty českých matematiků a fyziků (published by the Group of Cryprology of the Union of Czech mathematicians and physicists)

Jiří Janeček, Odhalená tajemství šifrovacích klíčů minulosti, Naše vojsko 1994

Jiří Přibyl, Jindřich Kodl: Ochrana dat v informatice, ČVUT 1996

 
Charles University | Information system of Charles University | http://www.cuni.cz/UKEN-329.html