University: Technical University of Košice
Faculty: Faculty of Electrical Engineering and Informatics
Department: Department of Computers and Informatics
Course Number: 26001004 Course Name: Cryptography Basics
Type, scope and method of learning activities:
Course Type: Lecture, Laboratory exercise
Recommended scope of the course content (in hours):
Full-time study (hours per week): 2,2
Part-time study (hours per semester): ST 26,26
Study Method:
Number of credits: 6
Recommended semester of study: ST
Recommended semester Study programme Study grade Study Method
2.rok ST Cybersecurity (KB_Bc_D_sk) Bachelor Attendance
Level of study:
Course completion requirements:
Assessment and completion of the course: Credit test and examination
Continuous assessment: Student passes the continuous assessment and receives credits when he or she meets the requirement to obtain at least 21% out of 40%.
Credit test
Final assessment: Student passes the final assessment and passes the examination when he or she meets the requirement to obtain at least 31% out of 60%.
Overall assessment: Overall assessment is the sum of the assessments obtained by students in the assessment period. The overall result is determined in accordance with the internal regulations of the Technical University in Košice. (Study Regulations, the internal regulation principles of doctoral studies)
Learning outcomes:
The student will acquire theoretical background in the area of cryptography and computer security. Based on this knowledge, he/she will be able to analyze and design a security solution for information and communication systems. Students will be able to explain principles of used algebraic structures, basic cryptographic primitives (hashes, random number generators, etc.), basic algorithms and describe the functioning of symmetric and asymmetric cryptosystems.
Brief course content:
1. Traditional vs. modern cryptography
2. Data Encryption Standard (DES)
3. Advanced Encryption Standard (AES)
4. Number theory and cryptography
5. RSA algorthm
6. Implementation of RSA algorithm
7. Elliptic Curve Cryptography (ECC)
8. Implementation of ECC
9. Hash functions
10. Digital signature
11. Authentication
12. Management of cryptosystems
Recommended Reference Sources:
1. STALLINGS, W.: Cryptography and network security: principles and practice. 7th Edition, Pearson, 2016, ISBN 01-333-5469-5.
2. MENEZES, A. J.: Handbook of applied cryptography. CRC Press, 1997, ISBN 08-493-8523-7.
3. GARRETT, P.: Making, breaking codes: an introduction to cryptology. Prentice Hall, 2001, ISBN 01-303-0369-0.
Recommended optional program components:
Languages required for the course completion: Slovak
Course assessment:
Total number of students assessed: 129
  A B C D E FX  
  2% 6% 15% 24% 29% 24%  
doc. Ing. Martin Tomášek, PhD.
Last modified: 31.08.2023
Approved by: person(s) responsible for the study program