 |
Detailinformationen |
Quellcurriculum |
Masterstudium Computer Science 2025W |
Lernergebnisse |
Kompetenzen |
(*)Students are able to understand, apply, analyze, and assess the most important cryptographic concepts, algorithms, and protocols to assure confidentiality, integrity, authenticity, and non-repudiation in the secure transmission and storage of data.
|
|
Fertigkeiten |
Kenntnisse |
(*)Students are able to (all skills on K2 to K5):
- assure confidentiality (C) in secure communication using symmetric block ciphers
- assure confidentiality (C) using symmetric stream ciphers
- assure confidentiality (C) using asymmetric cryptosystems
- assure integrity (I) using cryptographic hash functions
- assure authenticity (A) and non-repudiation (N) using digital signatures
- provide CIAN assurances in constrained environments and settings
- provide CIAN assurances in an efficient and integrated manner using cryptographic protocols
- understand the implications of large scale quantum computers on the security of existing cryptographic standards and know how to assure CIAN using post-quantum algorithms
|
(*)- Symmetric block ciphers: DES, Skipjack, AES, symmetric block cipher modes
- Symmetric stream ciphers: LFSRs, A5/1, RC4, ChaCha20
- Asymmetric cryptosystems: knapsack algorithms, Diffie-Hellman, RSA
- Cryptographic hash functions: essential properties, SHA-1, SHA-2, SHA-3
- Digital signatures: assurances provided, RSA signature algorithm
- ECC (Elliptic Curve Cryptography): specification of ECCs, ECDH, ECDSA
- LWC (Lightweight Cryptography): Ascon, a cipher suite to protect IoT data
- TLS (Transport Layer Security): TLS 1.3 and relevant sub-protocols
- PQC (Post-quantum Cryptography): Shor's Algorithm, ML-KEM, ML-DSA
|
|
Beurteilungskriterien |
(*)Written exam at the end of the semester; realization, presentation and documentation of (small) project.
|
Lehrmethoden |
(*)Slide presentation with case studies on the blackboard; project
|
Abhaltungssprache |
Englisch |
Literatur |
(*)PDF-versions of the slides used in the lecture will be made available via KUSSS.
Recommended reading:
Bruce Schneier (2006). Applied Cryptography. Person Studium.
Jean-Philippe Aumasson (2018). Serious Cryptography. No Starch Press.
|
Lehrinhalte wechselnd? |
Nein |
Sonstige Informationen |
(*)https://www.jku.at/en/institute-of-computational-perception/teaching/all-courses/cryptography/
|
Äquivalenzen |
(*)in collaboration with 921NESESECK13 (or INMAWKVSECC): KV Secure Code (1,5 ECTS) equivalent to INMNPKVKRYP: KV Kryptographie (4,5 ECTS)
|
|