Students can:
- Explain and discuss the rationales and reasons for constraints on how cryptographic parameters need to be set (K2)
- Mount simple attacks on classical cryptographic schemes to demonstrate vulnerabilities implied by improper parameter choices (K3)
- Understand and interpret different cryptographic security models (K2)
- Implement various advanced cryptographic schemes and run examples (K3)
- Understanding and the ability to use basic algebraic structures used in cryptography (finite fields and elliptic curves) (K2)
- Assess the potential and design security mechanisms with advanced cryptographic techniques (K5)
- Critically evaluate the meaning of cryptographic security in practical contexts (K5)
|
- Some selected attacks on public-key encryption and signatures
- Provable Security: methods of proving cryptographic security, security models (standard, random oracle, …)
- Homomorphic encryption: group-, somewhat and fully homomorphic encryption
- Commitments: bit- and string commitments, and their applications in cryptographic protocols
- Interactive Proofs and Zero-Knowledge proofs
- Identity-based cryptography: encryption and signatures, id-based crypto infrastructures
- "Special" digital signatures: undeniable signatures, blind signatures, editable signatures, post-quantum secure signatures
- Secret Sharing: Shamir’s threshold scheme, relations to error correcting codes and applications in multi-party computation
|