SUBJECT

Title

Cryptography

Type of instruction

lecture

Level

master

Part of degree program
Credits

3

Recommended in

Semesters 1-4

Typically offered in

Autumn/Spring semester

Course description
  • Data Security in Information Systems. Confidentiality, Integrity, Authenticity, Threats (Viruses, Covert Channels), elements of the Steganography and Cryptography;
  • Short history of Cryptography (Experiences, Risks);
  • Hierarchy in Cryptography: Primitives, Schemes, Protocols, Applications;
  • Random- and Pseudorandom Bit-Generators;
  • Stream Ciphers: Linear Feedback Shift Registers, Stream Ciphers based on LFSRs, Linear Complexity, Stream Ciphers in practice (GSM-A5, Bluetooth-E0, WLAN-RC4), The NIST Statistical Test Suite;
  • Block Ciphers: Primitives (DES, 3DES, IDEA, AES), Linear and Differential Cryptanalysis;
  • Public-Key Encryption: Primitives (KnapSack, RSA, ElGamal public-key encryption, Elliptic curve cryptography,…), Digital Signatures, Types of attacks on PKS (integer factorisation problem, Quadratic/Number field sieve factoring, wrong parameters,…);
  • Hash Functions and Data Integrity: Requirements, Standards and Attacks (birthday, collisions attacks);
  • Cryptographic Protocols: Modes of operations, Key management protocols, Secret sharing, Internet protocols (SSL-TLS, IPSEC, SSH,…)
  • Cryptography in Information Systems (Applications): Digital Signatures Systems (algorithms, keys, ETSI CWA requirements, Certification Authority, SSCD Protection Profile, X-509v3 Certificate,…), Mobile communications (GSM), PGP, SET,…;
  • Quantum Cryptography (quantum computation, quantum key exchange, quantum teleportation).
Readings
  • Bruce Schneier: Applied Cryptography. Wiley, 1996
  • Alfred J. Menezes, Paul C. van Oorshchor, Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1997, http://www.cacr.math.uwaterloo.ca/hac/