• Course home page

    Learning outcomes

    Having completed the course, you are able to recognize commonly used mathematical building blocks in cryptographic primitives and understand how they work. You are also familiar with the basic principles of cryptographic security which are authentication, confidentiality, and integrity of data. You can describe common attacks such as meet-in-the-middle, man-in-the-middle, and collision attacks, and understand basic limits of cryptographic security defined in terms of parameter lengths. Given a cryptographic primitive in a data security system, you can explain why such a primitive is used and what kind of security task it performs, as well as how it relates to other primitives in the system.

    Contents

    Data and communications security. Principles of cryptographic security. Secure and efficient cryptosystem implementation techniques. Symmetric key cryptosystems. Stream ciphers. Block ciphers. Modes of operation. Hash functions. Asymmetric cryptosystems. Digital signatures. Data authentication. Entity authentication and key agreement. Applications of cryptography in systems such as SSL, TLS, IPSec, GSM, Bluetooth.