Cryptography and Cryptoanalysis

Data is displayed for academic year: 2023./2024.

Course Description

This course gives an introduction to basic paradigms and principles of modern cryptography, with an emphasis on the fundamental cryptographic primitives of symmetric and public-key encryption, basic cryptanalysis, hash functions, and digital signatures.

Study Programmes

University graduate
[FER3-HR] Audio Technologies and Electroacoustics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Communication and Space Technologies - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Computational Modelling in Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Computer Engineering - profile
Elective Course of the Profile (1. semester)
Elective Courses (1. semester)
[FER3-HR] Computer Science - profile
Core-elective courses (1. semester) (3. semester)
[FER3-HR] Control Systems and Robotics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Data Science - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electrical Power Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electric Machines, Drives and Automation - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electronic and Computer Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electronics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Information and Communication Engineering - profile
Elective Courses (1. semester) (3. semester)
Elective Courses of the Profile (1. semester)
Elective Coursesof the Profile (3. semester)
[FER3-HR] Network Science - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Software Engineering and Information Systems - profile
Elective Course of the Profile (1. semester)
Elective Courses (1. semester)

Learning Outcomes

  1. apply symmetric cryptographic algorithms
  2. apply asymmetric cryptographic algorithms
  3. apply hash functions
  4. assemble symmetric and asymmetric algorithms into complex cryptosystems such as digital envelope
  5. illustrate authentication protocols and key exchange protocols
  6. explain and illustrate attacks on cryptographic primitives
  7. defend against cryptographic systems attacks

Forms of Teaching

Lectures

Once a week.

Laboratory

Laboratory exercises are done independently as part of homework.

Grading Method

Continuous Assessment Exam
Type Threshold Percent of Grade Threshold Percent of Grade
Laboratory Exercises 0 % 20 % 0 % 0 %
Quizzes 0 % 10 % 0 % 0 %
Mid Term Exam: Written 0 % 30 % 0 %
Final Exam: Written 0 % 40 %

Week by Week Schedule

  1. Perfect secrecy and one-time pad. Cipher types together with typical attack methods such as frequency analysis.
  2. Block ciphers DES, 3DES i AES. Feistel network.
  3. Block ciphers and modes of operation.
  4. Message integrity and hashing. Merkle-Damgard and sponge constructions. Pseudorandom number generators.
  5. Security definition of asymetric cryptosystem. RSA cryptosystem.
  6. Diffie-Hellman protocol and ElGamal cryptosystem. Introduction to digital signature: security definition.
  7. RSA and DSA digital signature.
  8. Midterm exam
  9. Public Key Infrastructure support for digital signature and encryption and its challenges.
  10. Cryptanalysis. Security definitions and attacks on cryptographic primitives. Brute-force attack. Side-channel attacks.
  11. Cryptographic protocols: authentication and key exchange. Protocol TLS.
  12. Challenge-response authentication, zero-knowledge protocols, commitment and secret sharing.
  13. Quantum attacks and quantum-resilient cryptography. Grover's algorithm and symmetric crypto, Shor's algorithm and public key crypto. Post-quantum crypto. Quantum key exchange protocol BB84.
  14. Motivate concepts using real-world applications, e.g., electronic cash, secure channels between clients and servers, voting systems. Cryptographic standards and references implementations.
  15. Final exam

Literature

Budin, L.; Golub, M; Jakobovic, D., Jelenkovc, L (2010.) (2013.), Operacijski sustavi, Element, Zagreb
(.), Christof Paar, Jan Pelzl, Understanding Cryptography, Springer-Verlag Berlin Heidelberg, 2009.,
(.), Nigel P. Smart, Cryptography Made Simple, Springer International Publishing, 2016.,

For students

General

ID 222637
  Winter semester
5 ECTS
L1 English Level
L1 e-Learning
45 Lectures
0 Seminar
0 Exercises
10 Laboratory exercises
0 Project laboratory

Grading System

88 Excellent
75 Very Good
63 Good
50 Sufficient

Similar Courses