Course detail

Cryptologic Protocol Theory

FEKT-GCPTAcad. year: 2019/2020

The course contains the introduction into advanced cryptography and provides the students with the information about basic cryptographic primitives and schemes. In particular, the commitment schemes, interactive proof systems, zero-knowledge protocols, sigma protocols, interactive and non-interactive proof of knowledge protocols, group signatures and advanced systems like eCash and attribute-based credentials are covered.

Language of instruction

English

Number of ECTS credits

5

Mode of study

Not applicable.

Learning outcomes of the course unit

Students will obtain theoretical knowledge of main primitives used in modern cryptography, in particular of commitment schemes, zero-knowledge protocols, sigma-protocols and advanced schemes built using these primitives. After course completion, students will be able to:

Explain in English the principles of cryptographic commitments, zero-knowledge protocols and sigma protocols.
Design the interactive proof of knowledge protocols.
Use the commitment schemes in complex cryptosystems.
Evaluate speed and computational efficiency of standard proof of knowledge protocols.
Explain in English the principles of attribute authentication systems and eCash systems.

Prerequisites

Basic knowledge of cryptography as provided in the compulsory subject Foundations of Cryptography, in particular of the asymmetric cryptosystems, is required to enroll the course. Furthermore, the basic knowledge of Czech terminology in cryptography and B1 intermediate English level is required.

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Methods of educations are described in the article 7 of the BUT’s Study and Examination Regulation. Teachning methods include lectures and laboratories. Course is taking advantage of e-learning (Moodle) system.

Assesment methods and criteria linked to learning outcomes

The maximum of 15 points is given upon completion of the theoretical test in laboratories. The correct completion of all tasks in laboratories adds 15 points. The requirements on the completion of the tasks in laboratories are described in the annual supervisor’s notice. The maximum of 70 points can be gained during the final exam.

Course curriculum

Lectures:
1. Introduction to modern cryptography.
2. Terminology overview.
3. Basic cryptographic primitives overview.
4. Commitment schemes.
5. Use of cryptographic commitment schemes in protocol construction.
6. Interactive proof systems.
7. Zero-knowledge protocols.
8. Sigma protocols.
9. Sigma protocols II.
10. Interactive and non-interactive proofs of knowledge.
11. Integration of primitives into advanced systems.
12. Group signatures.
13. Attribute-based credentials.

Laboratory exercises:
1. Introduction to laboratory.
2. Computational tools for modern cryptography.
3. Basic arithmetic operations.
4. Cryptographic commitment schemes.
5. Protocols using commitment schemes.
6. Interactive proof systems.
7. Construction of zero-knowledge protocols and formal proofs.
8. Optimization of zero-knowledge proofs.
9. Group signatures.
10. Complex cryptographic systems.

Work placements

Not applicable.

Aims

The goal of the course is to extend the introductory cryptology courses and to provide students with deeper knowledge of advanced principles of modern cryptology and English terminology. Students will learn the principles of selected building blocks of modern cryptographic protocols and schemes and will be able to understand English information sources during their further studies.

Specification of controlled education, way of implementation and compensation for absences

The conditions for the successful course completion are stated in the yearly updated supervisor’s notice.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

GARRETT, P. Making, breaking codes: an introduction to cryptology. Upper Saddle River: Prentice Hall, 2001. (EN)
MENEZES, A.J. Handbook of applied cryptography. Boca Raton: CRC Press, 1997. Online: http://cacr.uwaterloo.ca/hac/ (EN)
STALLINGS, W. Cryptography and network security: principles and practice. Seventh edition. (EN)

Recommended reading

Not applicable.

Classification of course in study plans

  • Programme TECO-G Master's

    branch G-TEC , 2 year of study, summer semester, elective specialised
    branch G-TEC , 1 year of study, summer semester, elective specialised

Type of course unit

 

Lecture

26 hod., optionally

Teacher / Lecturer

Syllabus

1. Introduction to modern cryptography.
2. Terminology overview.
3. Basic cryptographic primitives overview.
4. Commitment schemes.
5. Use of cryptographic commitment schemes in protocol construction.
6. Interactive proof systems.
7. Zero-knowledge protocols.
8. Sigma protocols.
9. Sigma protocols II.
10. Interactive and non-interactive proofs of knowledge.
11. Integration of primitives into advanced systems.
12. Group signatures.
13. Attribute-based credentials.

Fundamentals seminar

13 hod., compulsory

Teacher / Lecturer

Syllabus

1. Introduction to laboratory.
2. Computational tools for modern cryptography.
3. Basic arithmetic operations.
4. Cryptographic commitment schemes.
5. Protocols using commitment schemes.
6. Interactive proof systems.
7. Construction of zero-knowledge protocols and formal proofs.
8. Optimization of zero-knowledge proofs.
9. Group signatures.
10. Complex cryptographic systems.