Number of hours
- Lectures 9.0
- Tutorials 9.0
ECTS
ECTS 1.0
Goal(s)
This course presents differents applications of the information theory related to the transmission and storage of sensible data.
Contact Cécile DUMASContent(s)
1. Introduction - Information theory.
2. Lossless data compression.
3. Codes and Hamming distance.
4. Cryptography History.
5. Symmetric cryptography.
6. Asymmetric cryptography.
7. Chaining modes, RNG, Signature, Hash functions.
8. Smartcard Security.
Prerequisites
Basic knowledge in Probability, Algorithms and Arithmetic.
Test
E1 = Written exam (2h, allowed documents: printed slides and lecture notes)
E2 = Written exam (2h, allowed documents: printed slides and lecture notes)
N1=E1
N2=E2
Additional Information
Curriculum->Sandwich education->Alternance 2eme annee
Bibliography
Théorie des codes : compression, cryptage,correction. JG Dumas, JL Roch, E Tannier, S Varrette, Théorie des Codes, Dunod Sciences Sup. 2007