Security of computer and communication systems

Samples of possible topics:

Key establishment protocols

Note:
This topic covers issues related to a rich and extremely critical group of cryptographic protocols. Investigation of this area should enable the student to understand the common techniques used in these protocols, to differentiate between key transfer and key agreement, and to consider critical assumptions and outcomes of such protocols.

Keywords:
Key transport based on symmetric encryption and on public-key encryption. Key agreement based on symmetric techniques and on asymmetric techniques. Secret sharing. Conference keying. Analysis of key establishment protocols. Key management.

Typical resources:
Chapters 12, 13, 10 from Handbook of Applied Cryptography, Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, ISBN: 0-8493-8523-7, 5th printing (Aug 2001).

Chapters 10-13 from Cryptography Theory and Practice, Doug Stinson, ISBN 978-1584885085.

Examiners: prof. Václav Matyáš, dr. Jan Bouda, dr. Petr Švenda, dr. Zdeněk Říha.

Random numbers in cryptography

Note:
This topic covers (truly) random and pseudorandom numbers, their aspects relevant to cryptography and security, their generation, evaluation and application.

Keywords:
Random sequence generation. Pseudorandom sequence generation. Statistical tests. Cryptographically secure pseudorandom bit generation. Nonces in crypto protocols.

Typical resources:
Chapters 5, 4, parts of 14 from Handbook of Applied Cryptography, Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, ISBN: 0-8493-8523-7, 5th printing (Aug 2001).

Chapters 8 and 2 from Cryptography Theory and Practice, Doug Stinson, ISBN 978-1584885085.

Examiners: prof. Václav Matyáš, dr. Jan Bouda, dr. Petr Švenda, dr. Zdeněk Říha, prof. Jozef Gruska.