Inhalt

[ 921NESECRYK13 ] KV Cryptography

Versionsauswahl
Workload Education level Study areas Responsible person Hours per week Coordinating university
3 ECTS M1 - Master's programme 1. year Computer Science Josef Scharinger 2 hpw Johannes Kepler University Linz
Detailed information
Original study plan Master's programme Computer Science 2025W
Learning Outcomes
Competences
Students are able to understand, apply, analyze, and assess the most important cryptographic concepts, algorithms, and protocols to assure confidentiality, integrity, authenticity, and non-repudiation in the secure transmission and storage of data.
Skills Knowledge
Students are able to (all skills on K2 to K5):

  • assure confidentiality (C) in secure communication using symmetric block ciphers
  • assure confidentiality (C) using symmetric stream ciphers
  • assure confidentiality (C) using asymmetric cryptosystems
  • assure integrity (I) using cryptographic hash functions
  • assure authenticity (A) and non-repudiation (N) using digital signatures
  • provide CIAN assurances in constrained environments and settings
  • provide CIAN assurances in an efficient and integrated manner using cryptographic protocols
  • understand the implications of large scale quantum computers on the security of existing cryptographic standards and know how to assure CIAN using post-quantum algorithms
  • Symmetric block ciphers: DES, Skipjack, AES, symmetric block cipher modes
  • Symmetric stream ciphers: LFSRs, A5/1, RC4, ChaCha20
  • Asymmetric cryptosystems: knapsack algorithms, Diffie-Hellman, RSA
  • Cryptographic hash functions: essential properties, SHA-1, SHA-2, SHA-3
  • Digital signatures: assurances provided, RSA signature algorithm
  • ECC (Elliptic Curve Cryptography): specification of ECCs, ECDH, ECDSA
  • LWC (Lightweight Cryptography): Ascon, a cipher suite to protect IoT data
  • TLS (Transport Layer Security): TLS 1.3 and relevant sub-protocols
  • PQC (Post-quantum Cryptography): Shor's Algorithm, ML-KEM, ML-DSA
Criteria for evaluation Written exam at the end of the semester; realization, presentation and documentation of (small) project.
Methods Slide presentation with case studies on the blackboard; project
Language English
Study material PDF-versions of the slides used in the lecture will be made available via KUSSS.

Recommended reading: Bruce Schneier (2006). Applied Cryptography. Person Studium. Jean-Philippe Aumasson (2018). Serious Cryptography. No Starch Press.

Changing subject? No
Further information https://www.jku.at/en/institute-of-computational-perception/teaching/all-courses/cryptography/
Corresponding lecture in collaboration with 921NESESECK13 (or INMAWKVSECC): KV Secure Code (1,5 ECTS) equivalent to
INMNPKVKRYP: KV Kryptographie (4,5 ECTS)
On-site course
Maximum number of participants -
Assignment procedure Direct assignment