IV054 Codes, Cryptography and Cryptographical Protocols - 2014

Information and materials to the lecture (sylabus v IS).

ASSIGNMENTS: Exercises will be posted the day before the lecture at 18.00. Podmienky pre odovzdavanie a hodnotenie cviceni, pre skusku a zapocet
TUTORIALS: To the lecture IV054 there will be also a not obligatory tutorial/seminar.

The goal of the tutorial/seminar will be to make more clear topics of the lecture as well as some of its (especially mathematical) requirements.

One of the tutorials will be in Czech/Slovak with mgr. Matej Pivoluska. Tutorial is on Thursday at 16.00 in C525

Second tutorial will be in English with Dr. Shenggen Zheng. Tutorial is on Wendesday at 18.00 in A218

Appendix: It is recomended for all to read first the Appendix for a review of some basic facts from algebra and discrete mathematics, especially for those who do not feel very good in these areas

Contacts: gruska@fi.muni.cz
Teaching hours: streda 10:00-11:40, 2014, D2
Office hours: Wendesday13-14 J. Gruska B402, Tuesday 16-18 M. Pivoluska C516, pondelok 14.00-16.00 alebo dohodou emailom, Shenggen Zheng: Monday, Tuesday, Thursday, Friday, 9.00-17.00, C 518
Exams: 18.12.2014 - 8.00 C511; 7.1.2015 - 13.00 B410; 14.1.2015 - 13.00 B410; 21.1.2015 - 8.00 B410; 28.1.2015 - 13.00 B410

Podakovanie: Sucasnu formu tejto webovskej stranky vytvoril, pre uzitok vsetkych, Peter Boros, byvaly student IV054

Slides and exercises

Slides for future lectures accessible bellow and denoted as old are from 2010. Modified and actualized version of the slides will be usualy posted the day before the lecture or after the lecture. It is highly recomended to read/study the Appendix first.

Contents Contents of the lecture
Literature List of literature
Lecture 1 Basics of coding - new Slides 2×2 handouts Exercises - new
Lecture 2 Linear codes- new Slides 2×2 handouts Exercises - new
Lecture 3 Cyclic codes and channel codes - new Slides 2×2 handouts Exercises - new
Lecture 4 Secret key cryptography- new Slides 2×2 handouts Exercises - new
Lecture 5 Public key cryptography – key exchange, knapsack, RSA - new Slides 2×2 handouts Exercises - new
Lecture 6 Other public-key cryptosystems and basic cryptographic primitives - new Slides 2×2 handouts Exercises - new
Lecture 7 Digital signatures - new Slides 2×2 handouts Exercises - new
Lecture 8 Cryptography of eliptic curves and actorization-new Slides 2×2 handouts Exercises - new
Lecture 9 Authentication, identification, secret sharing and e-busines - new Slides 2×2 handouts Exercises - new
Lecture 10 Protocols doing seemingly impossible - new Slides 2×2 handouts Exercises - new
Lecture 11 Steganography and watermarking - new Slides 2×2 handouts Exercises - new, LAST ONE
Lecture 12 From crypto-theory to crypto-practice - new Slides -2×2 handouts
Lecture 13 Quantum cryptography - new Slides 2×2 handouts
Lecture 14 Cryptographic machines and history - new Slides 2×2 handouts
Appendix Algebra and number theory introduction Appendix