Applied Cryptography
Understand the building blocks of modern cryptographic protocols and learn the basics of cryptanalysis
Table of Content
Content
Cryptography is the mathematical backbone of information security. This lecture covers basic principles of cryptology and a closer look at the building blocks that provide confidentiality, authenticity, and more in modern cryptographic protocols, including:- Authenticated Encryption and its symmetric primitives, stream ciphers, and lightweight crypto (incl. AES-GCM, AES-CCM, ...)
- Hash functions and their primitives (incl. SHA-2, SHA-3)
- Asymmetric encryption, key encapsulation, and digital signatures (incl. RSA, DH, DSA, ECC)
- Authentication and key-exchange protocols, including an introduction to advanced privacy-preserving protocols
This course is succeeded by the equivalent course "Cryptography" (WS 2020/2021).
COVID-19 Exam Rules
To comply with the TU Graz COVID-19 guidance, the exams held during summer term 2020 will follow special rules. The written exam dates have fewer seats available; we will adjust the number of exam dates according to demand. If you are reluctant to participate in an on-campus exam (e.g., risk group), contact maria.eichlseder@iaik.tugraz.at to arrange a virtual oral exam. The question format and general rules (90 minutes, closed-book, etc.) for the written exams remain unchanged, but please observe the TU Graz hygiene guidelines (see below). Virtual oral exams are conducted via WebEx and obviously cover the same content, but the question format and duration is adapted for the medium (shorter, more interactive, order of questions set by examiner). You can find upcoming exam dates in TUGRAZonline. If no upcoming dates are listed, ask us! Further information:- Video: Guideline for on-campus exams
- COVID-19 information by TU Graz
- (German) Prüfungsablauf für "kleine Präsenzprüfungen"
Material
Date | Who | Lecture (15:00–17:00, HS i1) | Practicals (14:15–15:00, HS i1) |
---|---|---|---|
04.10.2019 | MS | L1 – Introduction | – |
11.10.2019 | MS | L2 – Symm. Primitives | T1, py skeleton |
18.10.2019 | MS | L3 – Symm. Primitives 2 (Stream Ciphers, LW) | T2 |
25.10.2019 | LG | L4 – Symm. Primitives 3 (Cryptanalysis) | T3 |
08.11.2019 | ME | L5 – Symm. Modes 1 (Authentication) | T4 |
15.11.2019 | ME | L6 – Symm. Modes 2 (Encryption) | T5 |
22.11.2019 | – | KU Exam 1 | |
29.11.2019 | LG | L7 – Asymmetric Primitives 1 (Factoring, RSA) | T6 |
06.12.2019 | ME | L8 – Asymmetric Primitives 2 (Discrete Log, ECC) | T7 |
13.12.2019 | DK | L9 – Protocols 1 (Authentication, Key Exchange) | T8 |
10.01.2020 | DK | L10 – Protocols 2 (Advanced Protocols, Privacy) | T9 |
17.01.2020 | DK | L11 – Outro, New Challenges | T10 |
24.01.2020 | – | KU Exam 2 | |
31.01.2020 | VO Exam (Exam Questions) | – |
- Serious Cryptography, by J.-P. Aumasson
- Introduction to Cryptography with Coding Theory, by W. Trappe, L.C. Washington