Applied Cryptography
Informacje ogólne
Kod przedmiotu: | 239201-D |
Kod Erasmus / ISCED: |
11.9
|
Nazwa przedmiotu: | Applied Cryptography |
Jednostka: | Szkoła Główna Handlowa w Warszawie |
Grupy: |
Elective courses for AAB - masters Przedmioty kierunkowe do wyboru SMMD-ADA |
Punkty ECTS i inne: |
3.00 (zmienne w czasie)
|
Język prowadzenia: | angielski |
Efekty uczenia się: |
Wiedza: A student should know: differences between symmetric and asymmetric cryptography, main applications of asymmetric cryptography to key exchange of symmetric ciphers and digital signatures. A student should know: computationally hard mathematical problems, which provide security of asymmetric cryptosystems, the integer factorization problem and the RSA cryptosystems, the discrete logarithm problem in finite fields and on elliptic curves, the Diffie-Hellman key exchange, ElGamal encryption, and digital signature algorithm, security levels and comparison of efficiency of the classical asymmetric cryptosytems, basic algorithms used in classical asymmetric cryptosystems. A student should know: cryptographic software used for the Internet and computer security, applications of cryptography in e-commerce and digital cash. Umiejętności: A student should be able to: describe classical protocols of asymmetric cryptography, write elementary algorithms used in classical asymmetric cryptosystems and implement them in a chosen programming language. A student should be able to make use of: symmetric and asymmetric cryptography, cryptographic software for Internet communication and computer security. A student should be able to: choose a kind of protections suitable for a given situation, perform successive steps to apply them. Kompetencje społeczne: Awareness of: the role of cryptography in current world and situations requiring protection, significance of data security, protection of financial means and confidentiality against unwanted incursion, risk in some situations following from omitting or bad use of cryptography, the role of security systems in other fields Improving computational and algorithms skills in implementation of algorithms and using cryptographic software. |
Zajęcia w cyklu "Preferencje - Semestr letni 2024/25" (jeszcze nie rozpoczęty)
Okres: | 2025-02-15 - 2025-09-30 |
Przejdź do planu
PN WT ŚR CZ PT |
Typ zajęć: |
Zajęcia prowadzącego
|
|
Koordynatorzy: | (brak danych) | |
Prowadzący grup: | Robert Dryło | |
Lista studentów: | (nie masz dostępu) | |
Zaliczenie: |
Przedmiot -
Ocena
Zajęcia prowadzącego - Ocena |
Zajęcia w cyklu "Semestr letni 2024/25" (jeszcze nie rozpoczęty)
Okres: | 2025-02-15 - 2025-09-30 |
Przejdź do planu
PN WT ŚR CZ PT |
Typ zajęć: |
Laboratorium, 30 godzin
|
|
Koordynatorzy: | (brak danych) | |
Prowadzący grup: | (brak danych) | |
Lista studentów: | (nie masz dostępu) | |
Zaliczenie: |
Przedmiot -
Ocena
Laboratorium - Ocena |
|
Skrócony opis: |
Basic cryptographic algorithms and standards used in practice for secure communications. Exercises in implementation and using cryptographic software for symmetric and asymmetric encryption, key exchange, and digital signatures. Cryptographic protocols and tools used in computer security, Internet, banking, e-commerce, electronic payment systems, cryptocash (bitcoin), and telecommunication. |
|
Pełny opis: |
Elementary introduction to basic cryptographic algorithms and standards used in practice for secure communications with emphasis on exercises in using cryptographic software for symmetric and asymmetric encryption, key exchange, and digital signatures. Survey of cryptographic protocols and explaining and their applications in computer security, Internet, banking, e-commerce, electronic payment systems, cryptocash (bitcoin), and telecommunication. |
|
Literatura: |
Literatura podstawowa: 1. Paar, Christof, and Jan Pelzl. Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media, 2009. 2. Mostafa Hashem Sherif, Protocols for Secure Electronic Commerce, Third Edition, 2016 by CRC Press. 3. Pedro Franco, Understanding Bitcoin, Cryptography, Engineering and Economics. Wiley Finance Series, 2015, Wiley. 4. Rhee, Man Young. "Internet Security." John Wilwy & Sons Ltd, England (2003). Literatura uzupełniająca: 1. N.P. Smart, Cryptography made simple, Information Security and Cryptography, Springer 2016. 2. Menezes A., Oorschot P., Vanstone S., Kryptografia stosowana, WNT. 3. Schneier, Bruce. Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007. 4. Stinson, Douglas R. Cryptography: theory and practice. CRC press, 2005. 5. Stallings William, Kryptografia i bezpieczeństwo sieci komputerowych. Matematyka szyfrów i techniki kryptologii. Wydawnictwo Helion. 6. Welschenbach, Michael. Cryptography in C and C++. Apress, 2006. |
|
Uwagi: |
Kryteria oceniania: kolokwium: 50.00% inne: 50.00% |
Zajęcia w cyklu "Semestr zimowy 2024/25" (w trakcie)
Okres: | 2024-10-01 - 2025-02-14 |
Przejdź do planu
PN WT LAB
ŚR CZ PT |
Typ zajęć: |
Laboratorium, 30 godzin
|
|
Koordynatorzy: | (brak danych) | |
Prowadzący grup: | Robert Dryło | |
Lista studentów: | (nie masz dostępu) | |
Zaliczenie: |
Przedmiot -
Ocena
Laboratorium - Ocena |
|
Skrócony opis: |
Basic cryptographic algorithms and standards used in practice for secure communications. Exercises in implementation and using cryptographic software for symmetric and asymmetric encryption, key exchange, and digital signatures. Cryptographic protocols and tools used in computer security, Internet, banking, e-commerce, electronic payment systems, cryptocash (bitcoin), and telecommunication. |
|
Pełny opis: |
Elementary introduction to basic cryptographic algorithms and standards used in practice for secure communications with emphasis on exercises in using cryptographic software for symmetric and asymmetric encryption, key exchange, and digital signatures. Survey of cryptographic protocols and explaining and their applications in computer security, Internet, banking, e-commerce, electronic payment systems, cryptocash (bitcoin), and telecommunication. |
|
Literatura: |
Literatura podstawowa: 1. Paar, Christof, and Jan Pelzl. Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media, 2009. 2. Mostafa Hashem Sherif, Protocols for Secure Electronic Commerce, Third Edition, 2016 by CRC Press. 3. Pedro Franco, Understanding Bitcoin, Cryptography, Engineering and Economics. Wiley Finance Series, 2015, Wiley. 4. Rhee, Man Young. "Internet Security." John Wilwy & Sons Ltd, England (2003). Literatura uzupełniająca: 1. N.P. Smart, Cryptography made simple, Information Security and Cryptography, Springer 2016. 2. Menezes A., Oorschot P., Vanstone S., Kryptografia stosowana, WNT. 3. Schneier, Bruce. Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007. 4. Stinson, Douglas R. Cryptography: theory and practice. CRC press, 2005. 5. Stallings William, Kryptografia i bezpieczeństwo sieci komputerowych. Matematyka szyfrów i techniki kryptologii. Wydawnictwo Helion. 6. Welschenbach, Michael. Cryptography in C and C++. Apress, 2006. |
|
Uwagi: |
Kryteria oceniania: kolokwium: 50.00% inne: 50.00% |
Zajęcia w cyklu "Semestr letni 2023/24" (zakończony)
Okres: | 2024-02-24 - 2024-09-30 |
Przejdź do planu
PN WT LAB
ŚR CZ PT |
Typ zajęć: |
Laboratorium, 30 godzin
|
|
Koordynatorzy: | (brak danych) | |
Prowadzący grup: | Robert Dryło | |
Lista studentów: | (nie masz dostępu) | |
Zaliczenie: |
Przedmiot -
Ocena
Laboratorium - Ocena |
|
Skrócony opis: |
Basic cryptographic algorithms and standards used in practice for secure communications. Exercises in implementation and using cryptographic software for symmetric and asymmetric encryption, key exchange, and digital signatures. Cryptographic protocols and tools used in computer security, Internet, banking, e-commerce, electronic payment systems, cryptocash (bitcoin), and telecommunication. |
|
Pełny opis: |
Elementary introduction to basic cryptographic algorithms and standards used in practice for secure communications with emphasis on exercises in using cryptographic software for symmetric and asymmetric encryption, key exchange, and digital signatures. Survey of cryptographic protocols and explaining and their applications in computer security, Internet, banking, e-commerce, electronic payment systems, cryptocash (bitcoin), and telecommunication. |
|
Literatura: |
Literatura podstawowa: 1. Paar, Christof, and Jan Pelzl. Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media, 2009. 2. Mostafa Hashem Sherif, Protocols for Secure Electronic Commerce, Third Edition, 2016 by CRC Press. 3. Pedro Franco, Understanding Bitcoin, Cryptography, Engineering and Economics. Wiley Finance Series, 2015, Wiley. 4. Rhee, Man Young. "Internet Security." John Wilwy & Sons Ltd, England (2003). Literatura uzupełniająca: 1. N.P. Smart, Cryptography made simple, Information Security and Cryptography, Springer 2016. 2. Menezes A., Oorschot P., Vanstone S., Kryptografia stosowana, WNT. 3. Schneier, Bruce. Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007. 4. Stinson, Douglas R. Cryptography: theory and practice. CRC press, 2005. 5. Stallings William, Kryptografia i bezpieczeństwo sieci komputerowych. Matematyka szyfrów i techniki kryptologii. Wydawnictwo Helion. 6. Welschenbach, Michael. Cryptography in C and C++. Apress, 2006. |
|
Uwagi: |
Kryteria oceniania: kolokwium: 50.00% inne: 50.00% |
Zajęcia w cyklu "Semestr zimowy 2023/24" (zakończony)
Okres: | 2023-10-01 - 2024-02-23 |
Przejdź do planu
PN WT LAB
ŚR CZ PT |
Typ zajęć: |
Laboratorium, 30 godzin
|
|
Koordynatorzy: | (brak danych) | |
Prowadzący grup: | Robert Dryło | |
Lista studentów: | (nie masz dostępu) | |
Zaliczenie: |
Przedmiot -
Ocena
Laboratorium - Ocena |
|
Skrócony opis: |
Basic cryptographic algorithms and standards used in practice for secure communications. Exercises in implementation and using cryptographic software for symmetric and asymmetric encryption, key exchange, and digital signatures. Cryptographic protocols and tools used in computer security, Internet, banking, e-commerce, electronic payment systems, cryptocash (bitcoin), and telecommunication. |
|
Pełny opis: |
Elementary introduction to basic cryptographic algorithms and standards used in practice for secure communications with emphasis on exercises in using cryptographic software for symmetric and asymmetric encryption, key exchange, and digital signatures. Survey of cryptographic protocols and explaining and their applications in computer security, Internet, banking, e-commerce, electronic payment systems, cryptocash (bitcoin), and telecommunication. |
|
Literatura: |
Literatura podstawowa: 1. Paar, Christof, and Jan Pelzl. Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media, 2009. 2. Mostafa Hashem Sherif, Protocols for Secure Electronic Commerce, Third Edition, 2016 by CRC Press. 3. Pedro Franco, Understanding Bitcoin, Cryptography, Engineering and Economics. Wiley Finance Series, 2015, Wiley. 4. Rhee, Man Young. "Internet Security." John Wilwy & Sons Ltd, England (2003). Literatura uzupełniająca: 1. N.P. Smart, Cryptography made simple, Information Security and Cryptography, Springer 2016. 2. Menezes A., Oorschot P., Vanstone S., Kryptografia stosowana, WNT. 3. Schneier, Bruce. Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007. 4. Stinson, Douglas R. Cryptography: theory and practice. CRC press, 2005. 5. Stallings William, Kryptografia i bezpieczeństwo sieci komputerowych. Matematyka szyfrów i techniki kryptologii. Wydawnictwo Helion. 6. Welschenbach, Michael. Cryptography in C and C++. Apress, 2006. |
|
Uwagi: |
Kryteria oceniania: kolokwium: 50.00% inne: 50.00% |
Właścicielem praw autorskich jest Szkoła Główna Handlowa w Warszawie.