Erinevus lehekülje "ITC8240 Cryptography (2021)" redaktsioonide vahel
Mine navigeerimisribale
Mine otsikasti
(Uus lehekülg: '== Course information == Code: ITC8240 Cryptography ECTS: 6 Assessment: examination Instructors: * Ahto Buldas ahto dot buldas at taltech dot ee * Nikita Snetkov nikita dot ...') |
(→Topics) |
||
13. rida: | 13. rida: | ||
== Topics == | == Topics == | ||
− | + | # Introduction to the course | |
− | + | # Simple (classical) ciphers: substitution, permutation, shift, affine, Vigenere | |
− | + | # Attacks against classical ciphers: attack types, basic attacks, attacks against Vigenere | |
− | + | # Theory of unbreakable ciphers I: basic conceptes of information theory | |
− | + | # Theory of unbreakable ciphers II: proof that one-time pad is unbreakable, attacks against imperfect ciprers, unicity distance | |
− | + | # Block ciphers: basic architectures, execution modes, etc. | |
− | + | # Key establishment: definition, proof that no key establishment protocol is secure against unlimited adversaries, DH key exchange idea | |
− | + | # Limited adversaries I: complexity theoretic approach to adversaries, complexity classes P and NP | |
− | + | # Limited adversaries II: randomized computations, related complexity classes, Chernoff bounds, etc. | |
− | + | # RSA cryptosystem: definition and related mathematical concepts | |
− | + | # RSA implementation failures: some examples how RSA should not be implemented | |
− | + | # Some other public key cryptosystems: ElGamal and related, EC cryptosystems, Paillier? | |
− | + | # Digital signature schemes and hash functions: security notions, paddings, hash function basics | |
− | + | # Cryptographic protocols: authentication, zero knowledge, etc. | |
− | + | # Quantum adversaries: concept, some results without proofs (Shor, Grover) and their security implications. Post-quantum cryptosystems (overview) | |
== E-learning process and grading criteria == | == E-learning process and grading criteria == |
Redaktsioon: 23. august 2021, kell 10:32
Course information
Code: ITC8240 Cryptography
ECTS: 6
Assessment: examination
Instructors:
- Ahto Buldas ahto dot buldas at taltech dot ee
- Nikita Snetkov nikita dot snetkov at taltech dot ee
Topics
- Introduction to the course
- Simple (classical) ciphers: substitution, permutation, shift, affine, Vigenere
- Attacks against classical ciphers: attack types, basic attacks, attacks against Vigenere
- Theory of unbreakable ciphers I: basic conceptes of information theory
- Theory of unbreakable ciphers II: proof that one-time pad is unbreakable, attacks against imperfect ciprers, unicity distance
- Block ciphers: basic architectures, execution modes, etc.
- Key establishment: definition, proof that no key establishment protocol is secure against unlimited adversaries, DH key exchange idea
- Limited adversaries I: complexity theoretic approach to adversaries, complexity classes P and NP
- Limited adversaries II: randomized computations, related complexity classes, Chernoff bounds, etc.
- RSA cryptosystem: definition and related mathematical concepts
- RSA implementation failures: some examples how RSA should not be implemented
- Some other public key cryptosystems: ElGamal and related, EC cryptosystems, Paillier?
- Digital signature schemes and hash functions: security notions, paddings, hash function basics
- Cryptographic protocols: authentication, zero knowledge, etc.
- Quantum adversaries: concept, some results without proofs (Shor, Grover) and their security implications. Post-quantum cryptosystems (overview)
E-learning process and grading criteria
Lectures:
Practice:
Homeworks:
Grading:
Communication: