[ 489WKESACRK22 ] KV Advanced Cryptology

Workload Education level Study areas Responsible person Hours per week Coordinating university
3 ECTS M2 - Master's programme 2. year (*)Informationselektronik Stefan Rass 2 hpw Johannes Kepler University Linz
Detailed information
Original study plan Master's programme Electronics and Information Technology 2021W
Objectives The course introduces advanced cryptographic techniques and algorithms. Students should acquire an understanding of what (other) cryptographic techniques besides encryption and digital signatures exist, and what they can or cannot do.
Subject Contents are the following (among further, as time permits):

  • Some Selected Attacks on Public-Key Encryption and Signatures
  • Provable Security
  • Homomorphic Encryption
  • Commitments
  • Interactive Proofs
  • Identity-Based Cryptography
  • "Special" Digital Signatures
  • Broadcast Encryption
  • Quantum Key Distribution

The particular choice of topics is subject to change and done as time permits. We will include new topics as they emerge, and drop (older) topics upon decaying (scientific) interest.

Criteria for evaluation The grading is based on the submission of exercise sheets and a final online exam in Moodle (quiz) with multiple-choice questions.
Methods The teaching follows a lecture with aligned hands-on examples and exercises. Students will be asked to implement some of the techniques to run their own instances of various algorithms and attacks to see them “in action”.
Language English
Study material Self-contained lecture slides and up-to-date literature references are provided in the course. Additionally useful references are the classical Handbooks:

in addition to recent research papers as announced in the lecture directly.

  • Menezes, A., van Oorschot, P.C., Vanstone, S.A., 1997. Handbook of applied Cryptography. CRC Press LLC.
  • Schneier, B., 1996. Applied cryptography: protocols, algorithms, and source code in C, 2nd ed. ed. Wiley, New York.
Changing subject? No
Further information There are no explicit pre-requisites to attend the course, though it is advantageous to have completed “344.016 Cryptography” or other security courses. The required basics will, however, be reviewed and provided in this course to all students to self-prepare or refresh their knowledge. The course content does not overlap with other security courses.
On-site course
Maximum number of participants -
Assignment procedure Assignment according to sequence