Cryptography

Repository

Repository is empty

Poll

No polls currently selected on this page!

Cryptography

Code: 284238
ECTS: 5.0
Lecturers in charge: prof. dr. sc. Andrej Dujella
Take exam: Studomat
Load:

1. komponenta

Lecture typeTotal
Lectures 45
* Load is given in academic hour (1 academic hour = 45 minutes)
Description:
COURSE AIMS AND OBJECTIVES:
Enable students to:
- understand the mathematical background on which the security of modern ciphers is based;
- independently analyze and break classic and simplified versions of modern ciphers.

COURSE DESCRIPTION AND SYLLABUS:
1. Classical cryptography. Basic notions. Substitution cipher. Vigenere's cipher. Playfair cipher. Hill's cipher. Transposition ciphers. Encryption devices (Enigma).
2. Modern symmetric block cryptosystems. History of DES. Description of the DES algorithm. Cryptanalysis of DES. Some other modern block cryptosystems. Advanced Encryption Standard.
3. Public key cryptosystems. The idea of public key and digital signature. RSA cryptosystem. Cryptanalysis of the RSA cryptosystem. Other public key cryptosystems
Literature:
  1. Kriptografija, A. Dujella, M. Maretić, Element, Zagreb, 2007.
  2. Cryptography. Theory and Practice, D. R. Stinson, CRC Press, Boca Raton, 2005.
  3. Teorija brojeva, A. Dujella, Školska knjiga, Zagreb, 2019.
  4. An Introduction to Mathematical Cryptography, J. Hoffstein, J. Pipher, J. H. Silverman, Springer, New York, 2008.
  5. Kriptografija kroz primjere, B. Ibrahimpašić, Pedagoški fakultet Bihać, 2011.
  6. The Codebreakers. The Story of Secret Writing, D. Kahn, Scribner, New York, 1996.
  7. A Course in Number Theory and Cryptography, N. Koblitz, Springer-Verlag, New York, 1994.
  8. Handbook of Applied Cryptography, A. J. Menezes, P. C. Oorschot, S. A. Vanstone, CRC Press, Boca Raton, 1996.
  9. Public-Key Cryptography, A. Salomaa, Springer-Verlag, Berlin, 1996.
  10. Applied Cryptography, B. Schneier, John Wiley, New York, 1995.
  11. The Code Book, S. Singh, Fourth Estate, London, 1999.
  12. Cryptography. An Introduction, N. Smart, McGraw-Hill, New York, 2002.
  13. Cryptography and Network Security. Principles and Practice, W. Stallings, Prentice Hall, Upper Sadle River, 2005.
  14. Introduction to Cryptography with Coding Theory, W. Trappe, L. C. Washington, Prentice Hall, Upper Sadle River, 2002.
1. semester
Izborni modul B - Teorijsko računarstvo - Regular study - Computer Science and Mathematics
Ostali izborni predmeti - Regular study - Computer Science and Mathematics

2. semester Not active
Izborni modul B - Teorijsko računarstvo - Regular study - Computer Science and Mathematics
Ostali izborni predmeti - Regular study - Computer Science and Mathematics
Consultations schedule:

News - Archive

Return

Results 0 - 0 of 0
Page 1 of 0
Results per page: 
No news!