Detailed information |
Original study plan |
Master's programme Electronics and Information Technology 2021W |
Objectives |
The course introduces advanced cryptographic techniques and algorithms. Students should acquire an understanding of what (other) cryptographic techniques besides encryption and digital signatures exist, and what they can or cannot do.
|
Subject |
Contents are the following (among further, as time permits):
- Some Selected Attacks on Public-Key Encryption and Signatures
- Provable Security
- Homomorphic Encryption
- Commitments
- Interactive Proofs
- Identity-Based Cryptography
- "Special" Digital Signatures
- Secret Sharing
The particular choice of topics is subject to change and done as time permits. We will include new topics as they emerge, and drop (older) topics upon decaying (scientific) interest.
|
Criteria for evaluation |
The grading is based on the submission of exercise sheets and a final literature survey.
|
Methods |
The teaching follows a lecture with aligned hands-on examples and exercises. Students will be asked to implement some of the techniques to run their own instances of various algorithms and attacks to see them “in action”.
|
Language |
English |
Study material |
Self-contained lecture slides and up-to-date literature references are provided in the course. Additionally useful references are the classical Handbooks:
in addition to recent research papers as announced in the lecture directly.
- Menezes, A., van Oorschot, P.C., Vanstone, S.A., 1997. Handbook of applied Cryptography. CRC Press LLC.
- Schneier, B., 1996. Applied cryptography: protocols, algorithms, and source code in C, 2nd ed. ed. Wiley, New York.
|
Changing subject? |
No |
Further information |
There are no explicit pre-requisites to attend the course, though it is advantageous to have completed “344.016 Cryptography” or other security courses. The required basics will, however, be reviewed and provided in this course to all students to self-prepare or refresh their knowledge. The course content does not overlap with other security courses.
|