 |
Detailed information |
Original study plan |
Master's programme Computer Science 2025W |
Learning Outcomes |
Competences |
Students are able to understand, apply, analyze, and assess the most important cryptographic concepts, algorithms, and protocols to assure confidentiality, integrity, authenticity, and non-repudiation in the secure transmission and storage of data.
|
|
Skills |
Knowledge |
Students are able to (all skills on K2 to K5):
- assure confidentiality (C) in secure communication using symmetric block ciphers
- assure confidentiality (C) using symmetric stream ciphers
- assure confidentiality (C) using asymmetric cryptosystems
- assure integrity (I) using cryptographic hash functions
- assure authenticity (A) and non-repudiation (N) using digital signatures
- provide CIAN assurances in constrained environments and settings
- provide CIAN assurances in an efficient and integrated manner using cryptographic protocols
- understand the implications of large scale quantum computers on the security of existing cryptographic standards and know how to assure CIAN using post-quantum algorithms
|
- Symmetric block ciphers: DES, Skipjack, AES, symmetric block cipher modes
- Symmetric stream ciphers: LFSRs, A5/1, RC4, ChaCha20
- Asymmetric cryptosystems: knapsack algorithms, Diffie-Hellman, RSA
- Cryptographic hash functions: essential properties, SHA-1, SHA-2, SHA-3
- Digital signatures: assurances provided, RSA signature algorithm
- ECC (Elliptic Curve Cryptography): specification of ECCs, ECDH, ECDSA
- LWC (Lightweight Cryptography): Ascon, a cipher suite to protect IoT data
- TLS (Transport Layer Security): TLS 1.3 and relevant sub-protocols
- PQC (Post-quantum Cryptography): Shor's Algorithm, ML-KEM, ML-DSA
|
|
Criteria for evaluation |
Written exam at the end of the semester; realization, presentation and documentation of (small) project.
|
Methods |
Slide presentation with case studies on the blackboard; project
|
Language |
English |
Study material |
PDF-versions of the slides used in the lecture will be made available via KUSSS.
Recommended reading:
Bruce Schneier (2006). Applied Cryptography. Person Studium.
Jean-Philippe Aumasson (2018). Serious Cryptography. No Starch Press.
|
Changing subject? |
No |
Further information |
https://www.jku.at/en/institute-of-computational-perception/teaching/all-courses/cryptography/
|
Corresponding lecture |
in collaboration with 921NESESECK13 (or INMAWKVSECC): KV Secure Code (1,5 ECTS) equivalent to INMNPKVKRYP: KV Kryptographie (4,5 ECTS)
|
|