Cryptography
A.Y. 2025/2026
Learning objectives
The objective of the course is to introduce the fundamental concepts and the most important applications of modern cryptography, with particular reference to the most important algorithms for symmetric and asymmetric cryptography, for the generation and application of hash and Mac functions, for digital signature, for key exchange, and for secret sharing.
Expected learning outcomes
At the end of the course, the student will know and will be able to apply the most important cryptographic techniques for ciphering, authentication, and data integrity. The student will be also able to evaluate the security of a cryptographic system.
Lesson period: First four month period
Assessment methods: Esame
Assessment result: voto verbalizzato in trentesimi
Single course
This course cannot be attended as a single course. Please check our list of single courses to find the ones available for enrolment.
Course syllabus and organization
Single session
Responsible
Lesson period
First four month period
Course syllabus
Classical cryptography: Substitution ciphers and ciphering mahines.
Symmetric Criptography: Block cipher encryption. DES and operation modes. AES.
Asymmetric Criptography:
Public key cryptograhy. RSA. Security and computational aspects. Primality tests. Elliptic curve cryptography. Digital signature and DSS
Hash functions and MAC: Hash functions: birthday attack, iterated hashfunctions, SHA-1, SHA-3. Message Authentication Code: CBC-MAC, MAC based on hash functions, HMAC.
Advanced topics: Commitment, Oblivious transfer, SMC, Zero-Knowledge
Security Protocols and Applications: PSI
Post quantum crypto: Lattice cryptography
Symmetric Criptography: Block cipher encryption. DES and operation modes. AES.
Asymmetric Criptography:
Public key cryptograhy. RSA. Security and computational aspects. Primality tests. Elliptic curve cryptography. Digital signature and DSS
Hash functions and MAC: Hash functions: birthday attack, iterated hashfunctions, SHA-1, SHA-3. Message Authentication Code: CBC-MAC, MAC based on hash functions, HMAC.
Advanced topics: Commitment, Oblivious transfer, SMC, Zero-Knowledge
Security Protocols and Applications: PSI
Post quantum crypto: Lattice cryptography
Prerequisites for admission
Stongly suggested to have passed Dicrete Mathematics
Teaching methods
Lecture
Teaching Resources
Website: http://scimatoc.ariel.ctu.unimi.it/v5/home/Default.aspx
William Stallings - Crittografia - Pearson, 2022
C. Paar - J Pelzl -Introduction to Cryptography
William Stallings - Crittografia - Pearson, 2022
C. Paar - J Pelzl -Introduction to Cryptography
Assessment methods and Criteria
Written test with open answers on closed books. At the end of the test, the evaluation is expressed on a scale from 0 to 30, taking into account the following parameters: grade of knowledge on the topics, capacity of applying the knowledge to real problems. An optional oral discussion on a topic or on the description of a project can be requested to increase the final evaluation. Exam results will be published on the relative website.
Professor(s)