No polls currently selected on this page!


Repository is empty

Cryptography and network security

Code: 92957
ECTS: 5.0
Lecturers in charge: prof. dr. sc. Andrej Dujella - Lectures
English level:


All teaching activities will be held in Croatian. However, foreign students in mixed groups will have the opportunity to attend additional office hours with the lecturer and teaching assistants in English to help master the course materials. Additionally, the lecturer will refer foreign students to the corresponding literature in English, as well as give them the possibility of taking the associated exams in English.

1. komponenta

Lecture typeTotal
Lectures 45
* Load is given in academic hour (1 academic hour = 45 minutes)
COURSE AIMS AND OBJECTIVES: The course aim is to make student familiar with basic methods used in cryptography and with mathematical background of these methods.

1. Classical cryptography. Basic notions. Substitution ciphers. Vigenere, Playfair and Hill chiphers. Transposition ciphers. Rotor machines (Enigma). (4 weeks)
2. Modern block ciphers. Data Encryption Standard (DES). Cryptoanalysis of DES. Advanced Encryption Standard (AES). (2 - 3 weeks)
3. Public key cryptography. Idea of public key cryptography. RSA cryptosystem. Cryptanalysis of RSA. Other public-key cryptosystems. (3 weeks)
4. Primality tests and factoring. Pseudoprimes. Soloway-Strassen and Miller-Rabin primality tests. Factor bases. Quadratic sieve method. (2 weeks)
5. Network security. Hash functions. Digital signature. Electronic mail security. IP security. (2 - 3 weeks)
  1. D. R. Stinson: Cryptography. Theory and Practice
  2. W. Stallings: Cryptography and Network Security. Principles and Practice
  3. N. Koblitz: A Course in Number Theory and Cryptography
  4. J. Daemen, V. Rijmen: The Design of Rijndael. AES - The Advanced Encryption Standard
  5. D. Kahn: The Codebreakers. The Story of Secret Writing
  6. J. Menezes, P. C. Oorschot, S. A. Vanstone: Handbook of Apllied Cryptography
  7. A. Salomaa: Public-Key Cryptography
  8. B. Schneier: Applied Cryptography
  9. J. Simmons (ed.): Contemporary Cryptology, The Science of Information Integrity
  10. S. Singh: The Code Book
  11. N. Smart: Cryptography. An Introduction
  12. M. Welschenbach: Cryptography in C and C++
3. semester
Mandatory course - Regular study - Computer Science and Mathematics
Consultations schedule: