Cryptography
A.Y. 2018/2019
Learning objectives
The course introduces the fundamental concepts and the most important applications of modern cryptography. Starting from the study of the classical techniques of cryptography, the course will introduce the most important algorithms for symmetric and asymmetric cryptography, the generation and application of hash and Mac functions, for digital signature, for key exchange and for secret sharing
Expected learning outcomes
Using and understanding of the most important cryptographic techniques for ciphering, authentication, and data integrity.
Reasoning on the robustness of a cryptographic system
Reasoning on the robustness of a cryptographic system
Lesson period: Second semester
Assessment methods: Esame
Assessment result: voto verbalizzato in trentesimi
Single course
This course cannot be attended as a single course. Please check our list of single courses to find the ones available for enrolment.
Course syllabus and organization
Erogazione in videoconferenza a Crema e Milano
Responsible
Lesson period
Second semester
Course syllabus
CLASSICAL CRYPTOGRAPHY
Classical techniques of cryptography and cryptoanalysis. Caesar, Playfair and Hill cipher. Polyalphabetic ciphers. Vigenere cipher and its cryptoanalysis. Cipher engines. One-time pad. Steganography.
SIMMETRIC CRIPTOGRAPHY
Principles of block ciphers. Feistel structures. DES and operation modes. Linear and differential criptoanalysis. AES. Other simmetric ciphers:Blowfish, RC5. Stream cipgers: RC4.
ASIMMETRIC CRIPTOGRAPHY
Principles of public key ciphers.. RSA. Security and computational aspects. Primality tests. El-Gamal cryptosystem. Elliptic curve cryptography.
HASH AND MAC
Hash functions: birthday attack, iterated hash functions, MD4, MD5, SHA-1, hash functions based on block ciphers. Message Authentication Code: CBC-MAC, MAC based on hash functions, HMAC.
DIGITALI SIGNATURES
RSA, Digital Signature Standard.
ADVANCED APPLICATIONS
Key exchange: Diffie-Hellmann. Secret sharing. Visual Cryptography
Classical techniques of cryptography and cryptoanalysis. Caesar, Playfair and Hill cipher. Polyalphabetic ciphers. Vigenere cipher and its cryptoanalysis. Cipher engines. One-time pad. Steganography.
SIMMETRIC CRIPTOGRAPHY
Principles of block ciphers. Feistel structures. DES and operation modes. Linear and differential criptoanalysis. AES. Other simmetric ciphers:Blowfish, RC5. Stream cipgers: RC4.
ASIMMETRIC CRIPTOGRAPHY
Principles of public key ciphers.. RSA. Security and computational aspects. Primality tests. El-Gamal cryptosystem. Elliptic curve cryptography.
HASH AND MAC
Hash functions: birthday attack, iterated hash functions, MD4, MD5, SHA-1, hash functions based on block ciphers. Message Authentication Code: CBC-MAC, MAC based on hash functions, HMAC.
DIGITALI SIGNATURES
RSA, Digital Signature Standard.
ADVANCED APPLICATIONS
Key exchange: Diffie-Hellmann. Secret sharing. Visual Cryptography
Professor(s)