Cryptography 06-DKRRLI0
Students will learn the terminology of modern cryptology.
They will understand the rules according to which modern cryptology works, including a rule about the complete transparency of the algorithm (protocol) and security provided by this algorithm (protocol) being based on complexity of solving certain computational problems.
Students will learn construction and implementation methods of cryptographic algorithms currently used in practice.
They will learn to solve certain problems that in the world of bits seem difficult, eg. "fair coin toss over the telephone", "electronic cash", and to realize those tasks securely and fairly through cryptographic protocols.
Students will familiarize themselves with dangers resulting from incorrect usage of cryptographic protocols.
In addition, students will be able to judge whether the proposed solution guarantees security based on rules of modern cryptology.
They will be able to configure applications using cryptographic mechanisms such that they provide the level of security adequate to their intended use.
Bibliography
D.R. Stinson, Cryptography. Theory and Practice, CRC Press, 1995, ISBN 0-8493-8521-0
N. Koblitz, A course in number theory and cryptography, Springer, 1994, ISBN: 978-0-387-94293-3
A.J. Menezes, P.C van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC, 1996, ISBN 0-8493-8523-7
B. Schneier, Applied Cryptography, John Wiley & Sons, New York 1994, ISBN 0-471-59756-2
Additional information
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: