Cryptography I
A.Y. 2023/2024
Learning objectives
The course aims to provide an in-depth knowledge of the cryptographic algorithms and protocols widely used in real life (symmetrical, asymmetric, hash functions, KDFs, key exchange), paying particular attention to applications that protect data in-transit data, at-rest, and end-to-end.
Expected learning outcomes
At the end of the course the students will be able to: (1) Understand and properly use symmetric/asymmetric encryption algorithms, hash functions, digital signatures; (2) Describe and use key exchange protocols, secret sharing schemes, secure communication protocols; (3) Analyze the security of a system and the attacks known in literature: collisions of hash functions, differential cryptanalysis, attacks on implementations..
Lesson period: First semester
Assessment methods: Esame
Assessment result: voto verbalizzato in trentesimi
Single course
This course cannot be attended as a single course. Please check our list of single courses to find the ones available for enrolment.
Course syllabus and organization
Single session
Responsible
Lesson period
First semester
Educational website(s)
Professor(s)
Reception:
By email appointment
Room 5008, 5th Floor, via Celoria 18, Computer Science Department