After the course, the student should understand the ideas and workings of public and secret-key cryptography in the IT security sector.
|
|
The course covers the following topics:
- Symmetric cryptography: encryption, authentication, hashing, ...
- Public key cryptography and post-quantum cryptography: encryption, signatures, KEMS, ...
- Security notions like existential forgery, IND-CCA, zero-knowledge, etc.
- Security proofs
- Protocols, like challenge-response protocols, proofs of knowledge, etc.
- Real-world protocols, like TLS, secure messaging, etc.
Prerequisite for this course is the course NWI-IBC023 "Introduction to Cryptography"
|
|
|
Take-away exam, open book.
|
|
|