Warsaw University of Technology - Central Authentication System
Strona główna

Cryptography and Data Security

General data

Course ID: 103A-CSCSN-MSA-ECDS
Erasmus code / ISCED: (unknown) / (unknown)
Course title: Cryptography and Data Security
Name in Polish: Cryptography and Data Security
Organizational unit: The Faculty of Electronics and Information Technology
Course groups: ( Advanced Courses )--M.Sc.-EITI
( Computer Systems and Networks - Advanced )-Computer Systems and Networks-M.Sc.-EITI
( Courses in English )--eng.-EITI
( Technical Courses )---EITI
( Technical Courses )--eng.-EITI
ECTS credit allocation (and other scores): (not available) Basic information on ECTS credits allocation principles:
  • the annual hourly workload of the student’s work required to achieve the expected learning outcomes for a given stage is 1500-1800h, corresponding to 60 ECTS;
  • the student’s weekly hourly workload is 45 h;
  • 1 ECTS point corresponds to 25-30 hours of student work needed to achieve the assumed learning outcomes;
  • weekly student workload necessary to achieve the assumed learning outcomes allows to obtain 1.5 ECTS;
  • work required to pass the course, which has been assigned 3 ECTS, constitutes 10% of the semester student load.

view allocation of credits
Language: English
(in Polish) Jednostka decyzyjna:

(in Polish) 103000 - Wydział Elektroniki i Technik Informacyjnych

(in Polish) Kod wydziałowy:

(in Polish) ECDS

(in Polish) Numer wersji:

(in Polish) 1

Short description:

The main aim of the lecture is introduction to cryptographic methods in computer systems and computer networks. Ciphers, cryptographic protocols, private and public key cryptography, digital signatures, hash functions are main stream of the lecture. The conspectus of the lecture is similar to the Polish version.

Full description:

The main aim of the lecture is introduction to cryptographic methods in computer systems and computer networks. Ciphers, cryptographic protocols, private and public key cryptography, digital signatures, hash functions are main stream of the lecture. The conspectus of the lecture is similar to the Polish version.


Lecture contents

  1. Mathematical background (number theory, abstract algebra, complexity theory). (computations in finite fields and rings i.e. modular computations, congruencies, finite fields commutative rings, Euler`s theorem, GCD and extended Euclid`s algorithm, probabilistic and deterministic primality tests, Miller-Rabin`s algorithm, primes generation, computational complexity and NP hard problems (integer factorization problem, discrete logarithm problem, Diffi -Hellmann`s problem).

  2. Cryptography - basic terminology and concepts ("objectivies and primitivies", alphabet, language, code, Hamming distance, cipher, cryptographic systems, different kinds of ciphers, block ciphers, stream ciphers, one-way functions)

  3. Classical ciphers (Cesear, Playfair, Vigenaire, Vernam, Enigma, ideal ciphers, substitution ciphers, transposition ciphers, product ciphers)

  4. Symmetric cryptography and block ciphers (Feistel`s architecture, round, S-box, avalanche effect, DES, DES S-boxes, 3DES, DESX, IDEA, FEAL, Lucipher, MARS, CAST 256, SAFER, RC5, AES-Rijndael, Twofish, Blowfish)

  5. Public key ciphers ( RSA, Rabin`s cipher, ElGamal`s cipher, McEliece`s cipher, knapsack ciphers (Merkle-Hellman and Chore-Rivest), probabilistic ciphers, cryptographic systems based on elliptic curves, generation of public key ciphers parameters)

  6. Elliptic curves an cryptographic systems based on elliptic curves (ciphers and digital signatures)

  7. Stream ciphers and ciphering modes (stream ciphers based on LFSRs, ECB, CBC and so on)

  8. Hash functions and data integrity. (properties and classification of hash functions relationships between properties), keyed hash functions (MACs), unkeyed hash functions (MDCs), hash functions: MD5, SHA-1 and so on, Chaum-van Heijst - Pfitzmann`s hash functions, MACs based on block ciphers, Davis method and so on)

  9. Identification and Entity Authentication (passwords - weak authentication, challenge -response authentication - strong authentication, zero-knowledge proofs, zero-knowledge identification protocols)

  10. Documents Authentication - digital signatures. Basic digital signatures properties, different kinds of digital signatures, digital signatures based on RSA, ElGamal`s digital signatures, DSS standard, digital signatures based on entity authentication protocols (Fiat`a-Shamir, Schnorr, Guillou-Quisquater`s protocols), blind digital signatures

  11. Cryptographic Protocols (wide mouth frog protocol, Yahalom protocol, time stamping and so on)

  12. Key distribution protocols (Diffi-Hellmann protocols, TTP and so on)

  13. Key management, public key infrastructure - PKI, CA - organization

  14. Random and pseudorandom numbers generators for cryptographic aims.

  15. Attacks on cryptographic systems and elements of cryptoanalysis (linear cryptoanalysis, differential cryptoanalysis and so on)

  16. Fast implementations of cryptographic algorithms (fast algorithms for multiple -precision residual and integer arithmetic, fast exponentiation, fast GCD computations, specialized hardware solutions)



  17. Projects contents
    Special sets of problems and individual projects are prepared for students.


Similar Courses
CodeNameDiscount ECTS
103A-ELEIK-ISP-PTKBPodstawy teoretyczne kryptografii i ochrony informacji4

Bibliography:

    1. A.Menezes, P.van Oorsschot, S.Vanstone; Handbook of Applied Cryptography; CRC Press 1996.

    2. N.Koblitz; A course in Number Theory and Cryptography; Springer Verlag, 1994.

    3. N.Koblitz; Algebraic aspects of Cryptography; Springer Verlag, 1998.

    4. B.Schneier; Applied Cryptography ; Wiley, 1996.
    5. T.Cormen, C.Leiserson, R.Rivest; Introduction to Algorithms; MIT 1994.

This course is not currently offered.
Course descriptions are protected by copyright.
Copyright by Warsaw University of Technology.
pl. Politechniki 1, 00-661 Warszawa tel: (22) 234 7211 https://pw.edu.pl contact accessibility statement USOSweb 7.0.0.0-7 (2024-03-18)