Study programmes / C-SE System engineering and informatics / Data Compression and Cryptology
Course code:KAS
Course title in language of instruction:Komprimace dat a kryptologie
Course title in Czech:Komprimace dat a kryptologie
Course title in English:Data Compression and Cryptology
Mode of completion and number of credits:Exam (6 credits)
(1 ECTS credit = 28 hours of workload)
Mode of delivery/Timetabled classes:full-time, 2/2
(full-time, hours of lectures per week / hours of seminars per week)
Language of instruction:Czech
Level of course:master continuing
Semester:WS 2018/2019 - FBE
Name of lecturer:Ing. Jan Přichystal, Ph.D. (supervisor)
Prerequisites:Final Bachelor Exam
 
Aims of the course:Orientation in theory of information and compression, introduction to methods of cryptography and cryptoanalysis. Student gets knowledges of funtionality of algorithms and their possibilities of usage for hiding and securing information.
Course contents:
1.Introduction to theory of information (allowance 4/2)
 
a.Enthropy
b.Information, infromation value
c.Data redundancy

2.Data compression (allowance 8/8)
 
a.Compression algorithms
b.Lossy and loseless compression
c.JPEG, LZW, MP3
d.Compression of text, audio and video formats

3.Ciphers (allowance 16/18)
 
a.History of cryptography and cryptoanalysis
b.Substitution ciphers and thir decoding. Caesar and Vigenere cipher
c.Modern symmetric algorithms. DES, 3DES, AES. Key distribution
d.Asymmetric cryptography, RSA
e.Digital signatures and certificates
f.Hash functions, MD5
g.Quantum cryptography
h.Cryptogames

Learning outcomes and competences:
Generic competences:
 
-ability to analyse and synthesize
-ability to apply knowledge
-ability to solve problems
-ability to work independently
-skilled at utilizing and processing information

Specific competences:
 
-Student is able do divide cipher algorithms according to their properties
-Student is able to describe how encrypt algorithms work
-Student is able to use algorithms to hide information
-Student is able to use encryption algorithms to secure information

Type of course unit:optional
Year of study:Not applicable - the subject could be chosen at anytime during the course of the programme.
Work placement:There is no compulsory work placement in the course unit.
Recommended study modules:none
Assessment methods:To get credits student must prepare final project in that he demonstrates deeper knowledge in selected field, student could present it in the form of essay or application. The second part of exam is oral examiniation. The both parts contribute to final grade by a half.
 
Learning activities and study load (hours of study load)
Type of teaching methodDaily attendance
Direct teaching
     lecture28 h
     practice28 h
Self-study
     preparation for exam70 h
     elaboration and execution of projects42 h
Total168 h

Basic reading list
  • FABIÁN, P. Komprimace dat: Principy a praxe. 1st ed. Praha: Computer Press, 2000. 173 p. ISBN 80-7226-231-6.
  • Handbook of applied cryptography. Boca Raton: CRC Press, 780 p. ISBN 0-8493-8523-7.
  • SINGH, S. Kniha kódů a šifer. Praha: Dokořán, 2003. 382 p. ISBN 80-86569-18-7.
Recommended reading list
  • BARRETT, D J. -- SILVERMAN, R E. SSH: kompletní průvodce. 1st ed. Brno: Computer Press, 2003. 556 p. ISBN 80-7226-852-X.
  • SCHNEIER, B. Applied cryptography: protocols, algorithms, and source code in C. New York: John Wiley & Sons, Inc., 1996. 758 p. ISBN 0-471-11709-9.
  • BITTO, O. Šifrování a biometrika, aneb, Tajemné bity a dotyky. 1st ed. Kralice na Hané: Computer Media, 2005. 168 p. ISBN 80-86686-48-5.
  • PGP: Pretty Good Privacy - šifrování pro každého. 1st ed. Praha: Computer Press, 1998. 373 p. ISBN 80-7226-054-5.
  • VAUDENAY, S. A Classical Introduction to Cryptography : Applications for Communications Security.  Boston, MA. 2006. ISBN 9780387258805. URL: http://dx.doi.org/10.1007/b136373.
  • KATZENBEISSER, S. -- PETITCOLAS, F A P. Information hiding techniques for steganography and digital watermarking: Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors. Boston: Artech House, 2000. 220 p. ISBN 1-58053-035-4.
  • DOSTÁLEK, L. -- VOHNOUTOVÁ, M. Velký průvodce infrastrukturou PKI a technologií elektronického podpisu. 1st ed. Brno: Computer Press, 2006. 534 p. ISBN 80-251-0828-7.
  • JIROUŠEK, R. et al. Principy digitální komunikace. 1st ed. Voznice: Leda, 2006. 309 p. ISBN 80-7335-084-X.
  • GARFINKEL, S. -- SPAFFORD, G. Bezpečnost v UNIXu a Internetu v praxi. 1st ed. 1998: Computer Press, 1998. 30 p. ISBN 80-7226-082-0.
  • SALOMON, D. Data Compression : The Complete Reference.  London. 2007. ISBN 9781846286032. URL: http://dx.doi.org/10.1007/978-1-84628-603-2.