SubjectsSubjects(version: 945)
Course, academic year 2016/2017
   Login via CAS
Cryptographical Systems - NMMB201
Title: Kryptografické systémy
Guaranteed by: Department of Algebra (32-KA)
Faculty: Faculty of Mathematics and Physics
Actual: from 2015 to 2018
Semester: summer
E-Credits: 4
Hours per week, examination: summer s.:1/2, C+Ex [HT]
Capacity: unlimited
Min. number of students: unlimited
4EU+: no
Virtual mobility / capacity: no
State of the course: taught
Language: Czech
Teaching methods: full-time
Teaching methods: full-time
Additional information: http://www.karlin.mff.cuni.cz/~kozlik/ks/
Guarantor: RNDr. Andrew Kozlík, Ph.D.
Class: M Bc. MMIB
M Bc. MMIB > Povinně volitelné
M Bc. MMIB > 2. ročník
M Bc. MMIT
M Bc. MMIT > Povinně volitelné
Classification: Mathematics > Algebra
Is pre-requisite for: NMMB349
Annotation -
Last update: G_M (16.05.2012)
Required course for bachelor's program in Information security.
Literature -
Last update: RNDr. Andrew Kozlík, Ph.D. (05.09.2017)

Serge Vaudenay: A Classical Introduction to Cryptography, Springer, 2006

Douglas R. Stinson: Cryptography: Theory and Practice, Third Edition, CRC Press, 2005

Hans Delfs, Helmut Knebl: Introduction to Cryptography, Springer, 2015

Christof Paar, Jan Pelzl: Understanding Cryptography: A Textbook for Students and Practitioners, Springer, 2010

Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996

Joan Daemen, Vincent Rijmen: The Design of Rijndael: AES - The Advanced Encryption Standard, Springer, 2002

Matthew Robshaw, Olivier Billet (Eds.): New Stream Cipher Designs, Lecture Notes in Computer Science, Vol. 4986, Springer, 2008

eSTREAM, the ECRYPT Stream Cipher Project: http://www.ecrypt.eu.org/stream/

Ecrypt Lightweight Cryptography Lounge: http://www.ecrypt.eu.org/lightweight/index.php/Main_Page

Syllabus -
Last update: RNDr. Andrew Kozlík, Ph.D. (05.09.2017)

Shannon's theory (entropy, mutual information, unicity distance, perfect secrecy).

The DES cipher. The meet-in-the-middle attack on 3DES. The AES cipher. Basic block cipher modes of operation (ECB, CBC, CFB, CFB-l, OFB, CTR).

Stream ciphers. Linear feedback shift registers. The A5/1 cipher.

Hash functions. The birthday paradox. The Merkle-Damgård construction. MAC, HMAC.

Public key cryptography and digital signature - RSA. Håstad's attack. Factorizing the modulus N using the exponents e and d. The Diffie-Hellman protocol and choosing the protocol parameters. The ElGamal encryption system, ElGamal signature scheme and the DSA algorithm.

 
Charles University | Information system of Charles University | http://www.cuni.cz/UKEN-329.html