Cryptography and Cryptoanalysis
Data is displayed for academic year: 2023./2024.
Lecturers
Course Description
This course gives an introduction to basic paradigms and principles of modern cryptography, with an emphasis on the fundamental cryptographic primitives of symmetric and public-key encryption, basic cryptanalysis, hash functions, and digital signatures.
Study Programmes
University graduate
[FER3-HR] Audio Technologies and Electroacoustics - profile
Elective Courses
(1. semester)
(3. semester)
[FER3-HR] Communication and Space Technologies - profile
Elective Courses
(1. semester)
(3. semester)
[FER3-HR] Computational Modelling in Engineering - profile
Elective Courses
(1. semester)
(3. semester)
[FER3-HR] Computer Engineering - profile
Elective Course of the Profile
(1. semester)
Elective Courses
(1. semester)
[FER3-HR] Computer Science - profile
Core-elective courses
(1. semester)
(3. semester)
[FER3-HR] Control Systems and Robotics - profile
Elective Courses
(1. semester)
(3. semester)
[FER3-HR] Data Science - profile
Elective Courses
(1. semester)
(3. semester)
[FER3-HR] Electrical Power Engineering - profile
Elective Courses
(1. semester)
(3. semester)
[FER3-HR] Electric Machines, Drives and Automation - profile
Elective Courses
(1. semester)
(3. semester)
[FER3-HR] Electronic and Computer Engineering - profile
Elective Courses
(1. semester)
(3. semester)
[FER3-HR] Electronics - profile
Elective Courses
(1. semester)
(3. semester)
[FER3-HR] Information and Communication Engineering - profile
Elective Courses
(1. semester)
(3. semester)
Elective Courses of the Profile
(1. semester)
Elective Coursesof the Profile
(3. semester)
[FER3-HR] Network Science - profile
Elective Courses
(1. semester)
(3. semester)
[FER3-HR] Software Engineering and Information Systems - profile
Elective Course of the Profile
(1. semester)
Elective Courses
(1. semester)
Learning Outcomes
- apply symmetric cryptographic algorithms
- apply asymmetric cryptographic algorithms
- apply hash functions
- assemble symmetric and asymmetric algorithms into complex cryptosystems such as digital envelope
- illustrate authentication protocols and key exchange protocols
- explain and illustrate attacks on cryptographic primitives
- defend against cryptographic systems attacks
Forms of Teaching
Lectures
Once a week.
LaboratoryLaboratory exercises are done independently as part of homework.
Grading Method
Continuous Assessment | Exam | |||||
---|---|---|---|---|---|---|
Type | Threshold | Percent of Grade | Threshold | Percent of Grade | ||
Laboratory Exercises | 0 % | 20 % | 0 % | 0 % | ||
Quizzes | 0 % | 10 % | 0 % | 0 % | ||
Mid Term Exam: Written | 0 % | 30 % | 0 % | |||
Final Exam: Written | 0 % | 40 % |
Week by Week Schedule
- Perfect secrecy and one-time pad. Cipher types together with typical attack methods such as frequency analysis.
- Block ciphers DES, 3DES i AES. Feistel network.
- Block ciphers and modes of operation.
- Message integrity and hashing. Merkle-Damgard and sponge constructions. Pseudorandom number generators.
- Security definition of asymetric cryptosystem. RSA cryptosystem.
- Diffie-Hellman protocol and ElGamal cryptosystem. Introduction to digital signature: security definition.
- RSA and DSA digital signature.
- Midterm exam
- Public Key Infrastructure support for digital signature and encryption and its challenges.
- Cryptanalysis. Security definitions and attacks on cryptographic primitives. Brute-force attack. Side-channel attacks.
- Cryptographic protocols: authentication and key exchange. Protocol TLS.
- Challenge-response authentication, zero-knowledge protocols, commitment and secret sharing.
- Quantum attacks and quantum-resilient cryptography. Grover's algorithm and symmetric crypto, Shor's algorithm and public key crypto. Post-quantum crypto. Quantum key exchange protocol BB84.
- Motivate concepts using real-world applications, e.g., electronic cash, secure channels between clients and servers, voting systems. Cryptographic standards and references implementations.
- Final exam
Literature
(.), Christof Paar, Jan Pelzl, Understanding Cryptography, Springer-Verlag Berlin Heidelberg, 2009.,
(.), Nigel P. Smart, Cryptography Made Simple, Springer International Publishing, 2016.,
For students
General
ID 222637
Winter semester
5 ECTS
L1 English Level
L1 e-Learning
45 Lectures
0 Seminar
0 Exercises
10 Laboratory exercises
0 Project laboratory
Grading System
88 Excellent
75 Very Good
63 Good
50 Sufficient