[ 489WKESACRK22 ] KV Advanced Cryptology

Workload Education level Study areas Responsible person Hours per week Coordinating university
3 ECTS M2 - Master's programme 2. year (*)Informationselektronik Stefan Rass 2 hpw Johannes Kepler University Linz
Detailed information
Original study plan Master's programme Electronics and Information Technology (ELIT) 2023W
Objectives The course introduces advanced cryptographic techniques and algorithms. Students will develop an understanding of what (other) cryptographic techniques exist besides encryption and digital signatures and what they can and cannot do.
Subject The contents are the following (among others as time permits):

  • Fundamentals of Cryptology (review): Arithmetic in finite groups and fields, encryption and digital signatures.
  • Some selected attacks on public-key encryption and signatures.
  • Provable security
  • Homomorphic encryption
  • Commitments
  • Interactive and zero-knowledge proofs
  • Secret sharing and error-correcting codes.
Criteria for evaluation Grading is based on the submission of exercise sheets and a final literature paper (no exam).
Methods The class consists of a lecture with practical examples and exercises coordinated with it. The students are expected to implement selected cryptographic procedures themselves to conduct their own experiments with different algorithms and attacks to observe the discussed algorithms "in action".
Language English
Study material Self-contained lecture slides and up-to-date literature references are provided in the course. Additionally useful references are the classical Handbooks:

in addition to recent research papers as announced in the lecture directly.

  • Menezes, A., van Oorschot, P.C., Vanstone, S.A., 1997. Handbook of applied Cryptography. CRC Press LLC.
  • Schneier, B., 1996. Applied cryptography: protocols, algorithms, and source code in C, 2nd ed. ed. Wiley, New York.
Changing subject? No
Further information There are no formal prerequisites for participation in this course. The required basics will all be discussed in the class and supplementary material will be provided to easily fill in any gaps through self-study. It is beneficial (although not required) to have taken the LVA "344.016 Cryptography" or other security courses.

The course does not overlap with other security courses.

On-site course
Maximum number of participants -
Assignment procedure Assignment according to sequence