[KrypBz] Cryptography and Safety

INGKIS

[KrypBz] Cryptography and Safety

Main objectives of the course:

Student will be able after passing through this course to distinguish between strong and weak cryptosystems. He-or-she will be acquainted with essential risks of using cryptography. He will be able to choose proper system for given application.

Course information sheet
University: University of Žilina
Faculty: Faculty of Management Science and Informatics
Course ID: 5II217Course name: Cryptography and Safety (KrypBz)
Form, extent and method of teaching activities:
Number of classes per week in the form of lectures,
laboratory exercises, seminars or clinical practice
Lectures: 2.0 Seminars: 0.0 Lab.exercises: 2.0
Methods by which the educational activity is deliveredPresent form of education
Applied educational activities and methods suitable for achieving learning outcomes
Number of credits: 5.0
Study workload: hours
Specification of the study workload:
Recommended term of study: 1. year, winter semester
Study degree: 2.
Required subsidiary courses:
Prerequisites:

Co-requisites:
Course requirements:
Continuous assessment / evaluation:
40 points
Final assessment /evaluation:
60 points
To enroll for an exam student must have 20 points.
Course outcomes:
Student will be able after passing through this course to distinguish between strong and weak cryptosystems. He-or-she will be acquainted with essential risks of using cryptography. He will be able to choose proper system for given application.
Course scheme:
Lectures:
1.History of cryptography. Today's importance of cryptography. General model of cryptography system. Model of a language and information channel. Information. Entropy of a information source. Essential statistic characterics of an information source.
2.Classical Cryptography. Monoalphabetic and polyalphabetic ciphers.Cryptanalysis and essential types of cryptanalysis attacks.
3.Perfect ciphers – One-Time Pad. Cryptography using linear feedback shift registers.
4.Mechanical cipher machines - Enigma.
5.Cryptographis protocols. Digital signature, autentification, identification.
6.Symetric keys. Diffie-Hellman key exchange. Feistelovho shceme – DES, GOST.
7.Another symmetric cryptograpic systems – IDEA.
8.Public key cryptography. RSA algoritmus.
9.Hash functions.
10. Stream Ciphers.
11.PGP - pretty good prifacy.
12.Quantum cryptography.

Exercises:
1 .Frequency analysis of a language. Tool for frquency analysis of slovak or another language. Determination of character probabilities and of conditional probability of characters in bigrams.
2. Study of properties of several monoalphabetic and polyalphabetic ciphers and creating corresponding programs. To create programs for attacks against several classical ciphers.
3. Stream ciphers - One Time Pad. To study difference between two ciphertexts - one enciphered by random key stream and another by key stream of real language. To propose attack against second mentioned case.
4. Analysis of pseudorandom generators from the point of vies of cryptography. Statistic tests of reandom generators.
5. Linear feedback shift registers - LSFR. Writing programs for LFSR cipher and program for attack against LSFR.
6. Mechanical cipher machines - Enigma. Computer model for ENIGMA enciphering.
7. Cipher algorithms of Feistell type. To design a simple one's own cipher of Feistell type. To examine probabilistic characteristics of ciphertext.
8. Cipehr algorithm IDEA.
9. Study of properties of natural numbers and primes. Euklid algorithm. Algorithms for examination of primality of large numbers. Arithmetic of large numbersl.
10.Study of properties and implementation of RSA algorithm.
11.Program PGP.
12.Discussion about problems of cryptography.
Literature:
Grošek, Porubský: Šifrovanie. Algoritmy, metódy, prax, GRADA 1992 ISBN 80-85424-62-2
Schneier B.: Applied Cryptography. Wiley and Sons 1996, ISBN 0-471-11709-9
Beutelspacher A.:Kryptologie, Vieweg, Germany 1994, ISBN 3-528-38990-7
Menezes A.J.,Oorschot, P.C. Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press LLC, ISBN 0-8493-8523-7
Stinson D.R.: Cryptography. Theory and Practice, CRC Press LLC, ISBN 0-8493-8521-0
Instruction language: slovak/english
Notes:
Course evaluation::
Total number of evaluated students: 139
ABCDEFX
31.65 %17.27 %18.71 %12.23 %15.83 % 4.32 %
ABCDEFX
31.65 %17.27 %18.71 %12.23 %15.83 % 4.32 %
Course teachers:
Lecture: doc. RNDr. Stanislav Palúch, CSc.
Laboratory: Ing. Tomáš Majer, PhD.
Last updated: 2021-08-25 06:22:24.000
The person responsible for the course: Ing. Tomáš Majer, PhD.
Approved by:
SOURCE: https://vzdelavanie.uniza.sk/vzdelavanie/planinfo.php?kod=261669&lng=en