Warsaw University of Technology - Central Authentication SystemYou are not logged in | log in
course directory - help

Cryptography and Data Security

General data

Course ID: 103A-CSCSN-MSA-ECDS Erasmus code / ISCED: (unknown) / (unknown)
Course title: Cryptography and Data Security Name in Polish: Cryptography and Data Security
Department: The Faculty of Electronics and Information Technology
Course groups: ( Advanced Courses )--M.Sc.-EITI
( Computer Systems and Networks - Advanced )-Computer Systems and Networks-M.Sc.-EITI
( Courses in English )--eng.-EITI
( Technical Courses )---EITI
( Technical Courses )--eng.-EITI
ECTS credit allocation (and other scores): 6.00
Language: English
(in Polish) Jednostka decyzyjna:

(in Polish) 103000 - Wydział Elektroniki i Technik Informacyjnych

(in Polish) Kod wydziałowy:

(in Polish) ECDS

(in Polish) Numer wersji:

(in Polish) 1

Short description:

The main aim of the lecture is introduction to cryptographic methods in computer systems and computer networks. Ciphers, cryptographic protocols, private and public key cryptography, digital signatures, hash functions are main stream of the lecture. The conspectus of the lecture is similar to the Polish version.

Full description:

The main aim of the lecture is introduction to cryptographic methods in computer systems and computer networks. Ciphers, cryptographic protocols, private and public key cryptography, digital signatures, hash functions are main stream of the lecture. The conspectus of the lecture is similar to the Polish version.


Lecture contents

  1. Mathematical background (number theory, abstract algebra, complexity theory). (computations in finite fields and rings i.e. modular computations, congruencies, finite fields commutative rings, Euler`s theorem, GCD and extended Euclid`s algorithm, probabilistic and deterministic primality tests, Miller-Rabin`s algorithm, primes generation, computational complexity and NP hard problems (integer factorization problem, discrete logarithm problem, Diffi -Hellmann`s problem).

  2. Cryptography - basic terminology and concepts ("objectivies and primitivies", alphabet, language, code, Hamming distance, cipher, cryptographic systems, different kinds of ciphers, block ciphers, stream ciphers, one-way functions)

  3. Classical ciphers (Cesear, Playfair, Vigenaire, Vernam, Enigma, ideal ciphers, substitution ciphers, transposition ciphers, product ciphers)

  4. Symmetric cryptography and block ciphers (Feistel`s architecture, round, S-box, avalanche effect, DES, DES S-boxes, 3DES, DESX, IDEA, FEAL, Lucipher, MARS, CAST 256, SAFER, RC5, AES-Rijndael, Twofish, Blowfish)

  5. Public key ciphers ( RSA, Rabin`s cipher, ElGamal`s cipher, McEliece`s cipher, knapsack ciphers (Merkle-Hellman and Chore-Rivest), probabilistic ciphers, cryptographic systems based on elliptic curves, generation of public key ciphers parameters)

  6. Elliptic curves an cryptographic systems based on elliptic curves (ciphers and digital signatures)

  7. Stream ciphers and ciphering modes (stream ciphers based on LFSRs, ECB, CBC and so on)

  8. Hash functions and data integrity. (properties and classification of hash functions relationships between properties), keyed hash functions (MACs), unkeyed hash functions (MDCs), hash functions: MD5, SHA-1 and so on, Chaum-van Heijst - Pfitzmann`s hash functions, MACs based on block ciphers, Davis method and so on)

  9. Identification and Entity Authentication (passwords - weak authentication, challenge -response authentication - strong authentication, zero-knowledge proofs, zero-knowledge identification protocols)

  10. Documents Authentication - digital signatures. Basic digital signatures properties, different kinds of digital signatures, digital signatures based on RSA, ElGamal`s digital signatures, DSS standard, digital signatures based on entity authentication protocols (Fiat`a-Shamir, Schnorr, Guillou-Quisquater`s protocols), blind digital signatures

  11. Cryptographic Protocols (wide mouth frog protocol, Yahalom protocol, time stamping and so on)

  12. Key distribution protocols (Diffi-Hellmann protocols, TTP and so on)

  13. Key management, public key infrastructure - PKI, CA - organization

  14. Random and pseudorandom numbers generators for cryptographic aims.

  15. Attacks on cryptographic systems and elements of cryptoanalysis (linear cryptoanalysis, differential cryptoanalysis and so on)

  16. Fast implementations of cryptographic algorithms (fast algorithms for multiple -precision residual and integer arithmetic, fast exponentiation, fast GCD computations, specialized hardware solutions)



  17. Projects contents
    Special sets of problems and individual projects are prepared for students.


Similar Courses
CodeNameDiscount ECTS
103A-ELEIK-ISP-PTKBPodstawy teoretyczne kryptografii i ochrony informacji4

Bibliography:

    1. A.Menezes, P.van Oorsschot, S.Vanstone; Handbook of Applied Cryptography; CRC Press 1996.

    2. N.Koblitz; A course in Number Theory and Cryptography; Springer Verlag, 1994.

    3. N.Koblitz; Algebraic aspects of Cryptography; Springer Verlag, 1998.

    4. B.Schneier; Applied Cryptography ; Wiley, 1996.
    5. T.Cormen, C.Leiserson, R.Rivest; Introduction to Algorithms; MIT 1994.

Classes in period "Summer Semester 2012/2013" (past)

Time span: 2013-02-20 - 2013-09-30
Choosen plan division:


magnify
see course schedule
Type of class: lectures, 30 hours, 30 places more information
project , 15 hours, 30 places more information
tutorials, 15 hours, 30 places more information
Coordinators: Tomasz Adamski
Group instructors: Tomasz Adamski
Students list: (inaccessible to you)
Examination: Exam
(in Polish) Jednostka realizująca:

(in Polish) 103300 - Instytut Systemów Elektronicznych

Course descriptions are protected by copyright.
Copyright by Warsaw University of Technology.