Asymmetric cryptography and public key cryptosystems

Course: System Analysis

Structural unit: Faculty of Computer Science and Cybernetics

Title
Asymmetric cryptography and public key cryptosystems
Code
Module type
Вибіркова дисципліна для ОП
Educational cycle
First
Year of study when the component is delivered
2023/2024
Semester/trimester when the component is delivered
8 Semester
Number of ECTS credits allocated
2
Learning outcomes
Know and understand the methods and techniques of building public key cryptographic systems, basic algorithms, protocols and standards of asymmetric cryptography. Be able to calculate and apply heavy-duty functions in the construction of asymmetric cryptosystems, have methods for constructing and applying various asymmetric cryptographic protocols and algorithms. Demonstrate the ability to self-study and continue professional development. Be able to organize their own activities and get results within a limited time. Demonstrate skills of interaction with other people, ability to work in teams.
Form of study
Full-time form
Prerequisites and co-requisites
know: basic concepts of mathematical analysis, discrete mathematics, linear and general algebra, number theory, probability theory, mathematical information theory, algorithm theory, theory of computational complexity, basic concepts of symmetric cryptography. be able to: program in a high-level language, be able to develop mathematical models of information processes and algorithms. have basic skills: solving problems of discrete mathematics, mathematical analysis, probability theory and mathematical statistics, linear algebra, information and coding theory, number theory, finite field theory.
Course content
Discipline "Asymmetric cryptography and public key cryptosystems" is part of the cycle of professional training for the first (bachelor's) educational level of knowledge 12 Information technology in specialty 124 "System Analysis" educational and professional program "System Analysis"; it includes the study of theoretical foundations of public key cryptography, asymmetric encryption systems, basic algorithms and schemes of digital signature systems, authentication, various cryptographic protocols, ways to use them in information security systems in various fields where information technology is used. Taught in the 8th semester, volume 60 hours. (2 ECTS credits), of which lectures - 20 hours., independent work - 40 hours. There are 2 substantive parts and an exam.
Recommended or required reading and other learning resources/tools
1. Bessalov AV, Telizhenko AB Cryptosystems on elliptic curves: Textbook. Manual. - Kyiv: Polytechnic Publishing House, 2004. - 224p. 2. Bogush VM, Krivutsa VG, Kudin AM Informational security. Terminological training guide. - К .: 2004. - 508м с. 3. Василенко О.Н. Theoretical and numerical algorithms in cryptography. - М .: МЦНМО, 2003. - 328с. 4. Verbitsky OV Introduction to cryptology. - Lviv: Scientific and Technical Literature, 1998. - 248p. 5. Diffie W., Hellman M. Security and imitation resistance. // TIIER. - 1979. - T.67, №3. - P.71- 109. 6. Zadiraka VK, Oleksyuk OS Computer cryptology. - К .: 2002. - 504 с. 7. Kuznetsov GV, Fomichev VV, Sushko SO Fomichova L.Ya. Mathematical foundations of cryptography. - Dnepropetrovsk: National Mining University, 2004. - Part 1. - 391 p.
Planned learning activities and teaching methods
Lecture, individual work
Assessment methods and criteria
Test work, exam.
Language of instruction
Ukrainian

Lecturers

This discipline is taught by the following teachers

Departments

The following departments are involved in teaching the above discipline