Go to JKU Homepage
Institute of Computational Perception
What's that?

Institutes, schools, other departments, and programs create their own web content and menus.

To help you better navigate the site, see here where you are at the moment.

Cryptography

This class is taught by Josef Scharinger in the summer term. The class is taught in English.

Information for the current semester (if available):

{{ labelInLang('cid') }} {{ labelInLang('title') }} {{ labelInLang('registration') }} {{ labelInLang('type') }} {{ labelInLang('hours') }} {{ labelInLang('teachers') }} {{ labelInLang('rhythm') }}
{{ item._id }} ({{ item.term }}) {{ item.title }}: {{ item.subtitle }}
{{ labelInLang('moreinfo') }}
{{ labelInLang('expand') }} {{ labelInLang('collapse') }}
{{ labelInLang('register') }} {{ item.type }} {{ item['hours-per-week'] }} {{ teacher.firstname }} {{ teacher.lastname }} {{ item.teachers.teacher.firstname }} {{ item.teachers.teacher.lastname }} {{ item.rhythm }}
{{ item._id }} ({{ item.term }})
{{ labelInLang('title') }} {{ item.title }}: {{ item.subtitle }}
{{ labelInLang('moreinfo') }}
{{ labelInLang('expand') }} {{ labelInLang('collapse') }}
{{ labelInLang('registration') }} {{ labelInLang('register') }}
{{ labelInLang('type') }} {{ item.type }}
{{ labelInLang('hours') }} {{ item['hours-per-week'] }}
{{ labelInLang('teachers') }} {{ teacher.firstname }} {{ teacher.lastname }} {{ item.teachers.teacher.firstname }} {{ item.teachers.teacher.lastname }}
{{ labelInLang('rhythm') }} {{ item.rhythm }}
 

Goals and Contents of this Class

In this course, students will learn about the cryptographic concepts, algorithms and protocols most relevant to ensure confidentiality, integrity, authenticity, and non-repudiation in secure communication. Specific topics to be covered include:

  • DES - Data Encryption Standard: history, description, security, variants, modes for block ciphers, successor
  • From DES to AES: SKIPJACK (originator: NSA), AES (Advanced Encryption Standard: official successor to the DES), GCM (Galois Counter Mode for block ciphers)
  • Symmetric stream ciphers: operational principle, generation of pseudo-random numbers, linear shift registers, A5 (GSM), RC4 (R. Rivest), ChaCha20 (D.J. Bernstein)
  • Asymmetric cryptosystems: motivation and operational principle, knapsack algorithms, Diffie-Hellman key agreement, public key cryptography according to ElGamal, RSA (key pair generation, encryption, decryption, security, performance) 
  • Cryptographic hash functions, Digital signatures: popular hash functions (SHA-1,-2), the new standard (SHA-3), digital signatures, important signature algorithms (RSA)
  • ECC - Elliptic Curve Cryptography: as a promising alternative to well established asymmetric cryptosystems (DH, DSA)
  • LWC - Lightweight Cryptography: Ascon, a cipher suite for „lightweight cryptography" to protect data created and transmitted by the Internet of Things and other small devices
  • TLS - Transport Layer Security (formerly known as SSL): the dominant protocol for providing a secure channel between a client and a server
  • Post-quantum Cryptography: quantum computer resistant cryptographic algorithms

Teaching materials:

PDF versions of the slides used in class will be made available on Monday before each lecture via KUSSS, opens an external URL in a new window.