Cryptography

This class is taught by Josef Scharinger in the summer term. The class is taught in English.

Information for the current semester (if available):

{{ labelInLang('cid') }} {{ labelInLang('title') }} {{ labelInLang('registration') }} {{ labelInLang('type') }} {{ labelInLang('hours') }} {{ labelInLang('teachers') }} {{ labelInLang('rhythm') }}
{{ item._id }} ({{ item.term }}) {{ item.title }}
{{ labelInLang('moreinfo') }}
{{ labelInLang('expand') }} {{ labelInLang('collapse') }}
{{ labelInLang('register') }} {{ item.type }} {{ item['hours-per-week'] }} {{ teacher.firstname }} {{ teacher.lastname }} {{ item.teachers.teacher.firstname }} {{ item.teachers.teacher.lastname }} {{ item.rhythm }}
{{ item._id }} ({{ item.term }})
{{ labelInLang('title') }} {{ item.title }}
{{ labelInLang('moreinfo') }}
{{ labelInLang('expand') }} {{ labelInLang('collapse') }}
{{ labelInLang('registration') }} {{ labelInLang('register') }}
{{ labelInLang('type') }} {{ item.type }}
{{ labelInLang('hours') }} {{ item['hours-per-week'] }}
{{ labelInLang('teachers') }} {{ teacher.firstname }} {{ teacher.lastname }} {{ item.teachers.teacher.firstname }} {{ item.teachers.teacher.lastname }}
{{ labelInLang('rhythm') }} {{ item.rhythm }}
 

Goals and Contents of this Class

In this course, students will learn about the cryptographic concepts, algorithms and protocols most relevant to ensure confidentiality, integrity, and authenticity in secure communication. Specific topics to be covered include:

  • DES - Data Encryption Standard: history, description, security, variants, modes for block ciphers, successor
  • From DES to AES: SKIPJACK (originator: NSA), AES (Advanced Encryption Standard: official successor to the DES), GCM (Galois Counter Mode for block ciphers)
  • Symmetric stream ciphers: operational principle, generation of pseudo-random numbers, linear shift registers, A5 (GSM), RC4 (R. Rivest), ChaCha20 (D.J. Bernstein)
  • Asymmetric cryptosystems: motivation and operational principle, knapsack algorithms, Diffie-Hellman key agreement, public key cryptography according to ElGamal, RSA (key pair generation, encryption, decryption, security, performance) 
  • Cryptographic hash functions, Digital signatures: popular hash functions (SHA-1,-2), the new standard (SHA-3), digital signatures, important signature algorithms (DSA, RSA)
  • ECC - Elliptic Curve Cryptography: as a promising alternative to well established asymmetric cryptosystems (DH, DSA, ElGamal)
  • PGP - Pretty Good Privacy: the probably most important cryptographic software system for secure e-mail transmission
  • TLS - Transport Layer Security (formerly known as SSL): the dominant protocol for providing a secure channel between a client and a server
  • Post-quantum Cryptography: quantum computer resistant cryptographic algorithms

Teaching materials:

PDF versions of the slides used in class will be made available on Monday before each lecture via KUSSS.