SUBJECT
Title
Cryptography
Type of instruction
lecture
Level
master
Faculty
Part of degree program
Credits
3
Recommended in
Semesters 1-4
Typically offered in
Autumn/Spring semester
Course description
- Data Security in Information Systems. Confidentiality, Integrity, Authenticity, Threats (Viruses, Covert Channels), elements of the Steganography and Cryptography;
- Short history of Cryptography (Experiences, Risks);
- Hierarchy in Cryptography: Primitives, Schemes, Protocols, Applications;
- Random- and Pseudorandom Bit-Generators;
- Stream Ciphers: Linear Feedback Shift Registers, Stream Ciphers based on LFSRs, Linear Complexity, Stream Ciphers in practice (GSM-A5, Bluetooth-E0, WLAN-RC4), The NIST Statistical Test Suite;
- Block Ciphers: Primitives (DES, 3DES, IDEA, AES), Linear and Differential Cryptanalysis;
- Public-Key Encryption: Primitives (KnapSack, RSA, ElGamal public-key encryption, Elliptic curve cryptography,…), Digital Signatures, Types of attacks on PKS (integer factorisation problem, Quadratic/Number field sieve factoring, wrong parameters,…);
- Hash Functions and Data Integrity: Requirements, Standards and Attacks (birthday, collisions attacks);
- Cryptographic Protocols: Modes of operations, Key management protocols, Secret sharing, Internet protocols (SSL-TLS, IPSEC, SSH,…)
- Cryptography in Information Systems (Applications): Digital Signatures Systems (algorithms, keys, ETSI CWA requirements, Certification Authority, SSCD Protection Profile, X-509v3 Certificate,…), Mobile communications (GSM), PGP, SET,…;
- Quantum Cryptography (quantum computation, quantum key exchange, quantum teleportation).
Readings
- Bruce Schneier: Applied Cryptography. Wiley, 1996
- Alfred J. Menezes, Paul C. van Oorshchor, Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1997,