Objectives:
This course gives an introduction to cryptographic protocols and primitives, with focus on their applications.
The goal of cryptography is information protection by the use of cryptographic primitives including ciphers, digital signatures, and hash functions, as well as cryptographic protocols that incorporate these primitives. Roughly speaking, cryptography provides tools to keep information secret from unauthorised parties who do not possess a secret key. Some cryptographic primitives are standardized, and these are widely deployed and used in security protocols in retail trade, banking, payments over the Internet, access control, and generally in any kind of digital communication and storage that involves sensitive or valuable information.
Content:
The course presents a selection of commonly used protocols. The selection may vary from year to year. Commonly used protocols include protocols for key exchange (e.g., Diffie-Hellman) and key lifetime, the TLS (Transport Layer Security) protocol, IPSec, protocols for smart card payments, the TOR onion routing protocol, secure messaging protocols, Wifi security (WEP, WPAx), block chain security protocols, authenticated encryption protocols, and release of unverified plain text.
During the discussion of the protocols, we also present and describe the cryptographic primitives used, including symmetric-key and public-key ciphers in general as well as specific instances and operation modes of such ciphers, hash functions and message authentication codes, digital signature schemes and public key infrastructures.
On completion of the course the student should have the following learning outcomes defined in terms of knowledge, skills and general competence.
The student should have knowledge of
Skills. The student is able to
General competence. The student
The teaching comprises of lectures and group exercises:
Lectures: 4 hours pr. week for 13 weeks
Group exercises: 2 hours pr. week
Student adviser:
T: 55 58 42 00