Applied Cryptography
Undergraduate course
- ECTS credits
- 10
- Teaching semesters
- Spring
- Course code
- INF143A
- Number of semesters
- 1
- Teaching language
- Norwegian
- Resources
- Schedule
Course description
Objectives and Content
Objectives:
This course gives an introduction to cryptographic protocols and primitives, with focus on their applications.
The goal of cryptography is information protection by the use of cryptographic primitives including ciphers, digital signatures, and hash functions, as well as cryptographic protocols that incorporate these primitives. Roughly speaking, cryptography provides tools to keep information secret from unauthorised parties who do not possess a secret key. Some cryptographic primitives are standardized, and these are widely deployed and used in security protocols in retail trade, banking, payments over the Internet, access control, and generally in any kind of digital communication and storage that involves sensitive or valuable information.
Content:
The course presents a selection of commonly used protocols. The selection may vary from year to year. Commonly used protocols include protocols for key exchange (e.g., Diffie-Hellman) and key lifetime, the TLS (Transport Layer Security) protocol, IPSec, protocols for smart card payments, the TOR onion routing protocol, secure messaging protocols, Wifi security (WEP, WPAx), block chain security protocols, authenticated encryption protocols, and release of unverified plain text.
During the discussion of the protocols, we also present and describe the cryptographic primitives used, including symmetric-key and public-key ciphers in general as well as specific instances and operation modes of such ciphers, hash functions and message authentication codes, digital signature schemes and public key infrastructures.
Learning Outcomes
On completion of the course the student should have the following learning outcomes defined in terms of knowledge, skills and general competence.
The student should have knowledge of
- cryptographic protocols; their function and their limitations, and the difficulty associated with designing them,
- properties of modern symmetric ciphers like AES,
- properties of modern asymmetric ciphers like RSA,
- properties of hash functions, MACs and digital signatures,
- the mathematical foundations of cryptography.
Skills. The student is able to
- implement a simple cryptographic protocol and at the same time be aware of the difficulty and the danger of doing so,
- explain the main cryptographic applications,
- digest and explain properties of cryptography primitives,
- locate issues in security protocols relevant to cryptography.
General competence. The student
- is familiar with new ideas and innovation processes,
- can exchange opinions with others with relevant background and participate in discussions concerning the development of good practice.
Full-time/Part-time
Semester of Instruction
Required Previous Knowledge
Recommended Previous Knowledge
Credit Reduction due to Course Overlap
Access to the Course
Teaching and learning methods
The teaching comprises of lectures and group exercises:
Lectures: 4 hours pr. week for 13 weeks
Group exercises: 2 hours pr. week
Compulsory Assignments and Attendance
Forms of Assessment
Compulsory exercises may count towards the final grade.