Aim of the course
This course is an introduction into the basic cryptographic methods, their algorithms, basic features, complexity, and the implementations of these algorithms. Hash functions are also presented as well as authentication codes. There are also discussed the key distribution protocols.
Introduction to cryptography. Mathematical foundations of cryptography. Symmetric encryption algorithms: block and stream ciphers. Public-key cryptography, digital signatures. Hash functions. Distribution of key.
Overview of the course elements
Laboratory classes consolidate and extend the knowledge delivered at lectures. Students will be able to choose and use available tools and cryptographic algorithms to perform the tasks that require confidentiality and security of such activities which require confidential information exchange, authentication, and authorization.
1. David Kahn: Code breakers. The history of cryptography, WNT 2004.
2. Douglas R. Stinson: Cryptography. Theory and practice, WNT 2005.
3. Bruce Schneier: Applied Cryptography, WNT 2002.
4. Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone: Applied cryptography, WNT 2005.
5. Ian Blake, Gadiel Seroussi, Nigel Smart: Elliptic curves in cryptography, WNT 2004.
6. Song Y. Yan: Number theory, in practice, PWN, 2006.