Inhalt

[ 921NESECRYK13 ] KV (*)Cryptography

Versionsauswahl
(*) Leider ist diese Information in Deutsch nicht verfügbar.
Workload Ausbildungslevel Studienfachbereich VerantwortlicheR Semesterstunden Anbietende Uni
3 ECTS M1 - Master 1. Jahr Informatik Josef Scharinger 2 SSt Johannes Kepler Universität Linz
Detailinformationen
Quellcurriculum Masterstudium Computer Science 2025W
Lernergebnisse
Kompetenzen
(*)Students are able to understand, apply, analyze, and assess the most important cryptographic concepts, algorithms, and protocols to assure confidentiality, integrity, authenticity, and non-repudiation in the secure transmission and storage of data.
Fertigkeiten Kenntnisse
(*)Students are able to (all skills on K2 to K5):

  • assure confidentiality (C) in secure communication using symmetric block ciphers
  • assure confidentiality (C) using symmetric stream ciphers
  • assure confidentiality (C) using asymmetric cryptosystems
  • assure integrity (I) using cryptographic hash functions
  • assure authenticity (A) and non-repudiation (N) using digital signatures
  • provide CIAN assurances in constrained environments and settings
  • provide CIAN assurances in an efficient and integrated manner using cryptographic protocols
  • understand the implications of large scale quantum computers on the security of existing cryptographic standards and know how to assure CIAN using post-quantum algorithms
(*)
  • Symmetric block ciphers: DES, Skipjack, AES, symmetric block cipher modes
  • Symmetric stream ciphers: LFSRs, A5/1, RC4, ChaCha20
  • Asymmetric cryptosystems: knapsack algorithms, Diffie-Hellman, RSA
  • Cryptographic hash functions: essential properties, SHA-1, SHA-2, SHA-3
  • Digital signatures: assurances provided, RSA signature algorithm
  • ECC (Elliptic Curve Cryptography): specification of ECCs, ECDH, ECDSA
  • LWC (Lightweight Cryptography): Ascon, a cipher suite to protect IoT data
  • TLS (Transport Layer Security): TLS 1.3 and relevant sub-protocols
  • PQC (Post-quantum Cryptography): Shor's Algorithm, ML-KEM, ML-DSA
Beurteilungskriterien (*)Written exam at the end of the semester; realization, presentation and documentation of (small) project.
Lehrmethoden (*)Slide presentation with case studies on the blackboard; project
Abhaltungssprache Englisch
Literatur (*)PDF-versions of the slides used in the lecture will be made available via KUSSS.

Recommended reading: Bruce Schneier (2006). Applied Cryptography. Person Studium. Jean-Philippe Aumasson (2018). Serious Cryptography. No Starch Press.

Lehrinhalte wechselnd? Nein
Sonstige Informationen (*)https://www.jku.at/en/institute-of-computational-perception/teaching/all-courses/cryptography/
Äquivalenzen (*)in collaboration with 921NESESECK13 (or INMAWKVSECC): KV Secure Code (1,5 ECTS) equivalent to
INMNPKVKRYP: KV Kryptographie (4,5 ECTS)
Präsenzlehrveranstaltung
Teilungsziffer -
Zuteilungsverfahren Direktzuteilung