Detailed information |
Original study plan |
Master's programme Electronics and Information Technology (ELIT) 2023W |
Objectives |
The course introduces advanced cryptographic techniques and algorithms. Students will develop an understanding of what (other) cryptographic techniques exist besides encryption and digital signatures and what they can and cannot do.
|
Subject |
The contents are the following (among others as time permits):
- Fundamentals of Cryptology (review): Arithmetic in finite groups and fields, encryption and digital signatures.
- Some selected attacks on public-key encryption and signatures.
- Provable security
- Homomorphic encryption
- Commitments
- Interactive and zero-knowledge proofs
- Secret sharing and error-correcting codes.
|
Criteria for evaluation |
Grading is based on the submission of exercise sheets and a final literature paper (no exam).
|
Methods |
The class consists of a lecture with practical examples and exercises coordinated with it. The students are expected to implement selected cryptographic procedures themselves to conduct their own experiments with different algorithms and attacks to observe the discussed algorithms "in action".
|
Language |
English |
Study material |
Self-contained lecture slides and up-to-date literature references are provided in the course. Additionally useful references are the classical Handbooks:
in addition to recent research papers as announced in the lecture directly.
- Menezes, A., van Oorschot, P.C., Vanstone, S.A., 1997. Handbook of applied Cryptography. CRC Press LLC.
- Schneier, B., 1996. Applied cryptography: protocols, algorithms, and source code in C, 2nd ed. ed. Wiley, New York.
|
Changing subject? |
No |
Further information |
There are no formal prerequisites for participation in this course. The required basics will all be discussed in the class and supplementary material will be provided to easily fill in any gaps through self-study. It is beneficial (although not required) to have taken the LVA "344.016 Cryptography" or other security courses.
The course does not overlap with other security courses.
|