This class is taught by Josef Scharinger in the summer term. The class is taught in English.
Information for the current semester (if available):
{{ labelInLang('cid') }} | {{ labelInLang('title') }} | {{ labelInLang('registration') }} | {{ labelInLang('type') }} | {{ labelInLang('hours') }} | {{ labelInLang('teachers') }} | {{ labelInLang('rhythm') }} |
---|---|---|---|---|---|---|
{{ item._id }} ({{ item.term }}) |
{{ item.title }}: {{ item.subtitle }}
{{ labelInLang('moreinfo') }} {{ labelInLang('expand') }} {{ labelInLang('collapse') }} |
{{ labelInLang('register') }} | {{ item.type }} | {{ item['hours-per-week'] }} | {{ teacher.firstname }} {{ teacher.lastname }} {{ item.teachers.teacher.firstname }} {{ item.teachers.teacher.lastname }} | {{ item.rhythm }} |
{{ item._id }} ({{ item.term }}) | |
{{ labelInLang('title') }} |
{{ item.title }}: {{ item.subtitle }}
{{ labelInLang('moreinfo') }} {{ labelInLang('expand') }} {{ labelInLang('collapse') }} |
{{ labelInLang('registration') }} | {{ labelInLang('register') }} |
{{ labelInLang('type') }} | {{ item.type }} |
{{ labelInLang('hours') }} | {{ item['hours-per-week'] }} |
{{ labelInLang('teachers') }} | {{ teacher.firstname }} {{ teacher.lastname }} {{ item.teachers.teacher.firstname }} {{ item.teachers.teacher.lastname }} |
{{ labelInLang('rhythm') }} | {{ item.rhythm }} |
Goals and Contents of this Class
In this course, students will learn about the cryptographic concepts, algorithms and protocols most relevant to ensure confidentiality, integrity, authenticity, and non-repudiation in secure communication. Specific topics to be covered include:
- DES - Data Encryption Standard: history, description, security, variants, modes for block ciphers, successor
- From DES to AES: SKIPJACK (originator: NSA), AES (Advanced Encryption Standard: official successor to the DES), GCM (Galois Counter Mode for block ciphers)
- Symmetric stream ciphers: operational principle, generation of pseudo-random numbers, linear shift registers, A5 (GSM), RC4 (R. Rivest), ChaCha20 (D.J. Bernstein)
- Asymmetric cryptosystems: motivation and operational principle, knapsack algorithms, Diffie-Hellman key agreement, public key cryptography according to ElGamal, RSA (key pair generation, encryption, decryption, security, performance)
- Cryptographic hash functions, Digital signatures: popular hash functions (SHA-1,-2), the new standard (SHA-3), digital signatures, important signature algorithms (RSA)
- ECC - Elliptic Curve Cryptography: as a promising alternative to well established asymmetric cryptosystems (DH, DSA)
- LWC - Lightweight Cryptography: Ascon, a cipher suite for „lightweight cryptography" to protect data created and transmitted by the Internet of Things and other small devices
- TLS - Transport Layer Security (formerly known as SSL): the dominant protocol for providing a secure channel between a client and a server
- Post-quantum Cryptography: quantum computer resistant cryptographic algorithms
Teaching materials:
PDF versions of the slides used in class will be made available on Monday before each lecture via KUSSS, opens an external URL in a new window.