Course detail

Cryptologic Protocol Theory

FEKT-XPC-CPTAcad. year: 2023/2024

The course contains the introduction into advanced cryptography and provides the students with the information about basic cryptographic primitives and schemes. In particular, the commitment schemes, interactive proof systems, zero-knowledge protocols, sigma protocols, interactive and non-interactive proof of knowledge protocols, group signatures and advanced systems like eCash and attribute-based credentials are covered.

Language of instruction

Czech

Number of ECTS credits

5

Mode of study

Not applicable.

Entry knowledge

Basic knowledge of cryptography as provided in the compulsory subject Foundations of Cryptography, in particular of the asymmetric cryptosystems, is required to enroll the course. Furthermore, the basic knowledge of Czech terminology in cryptography and B1 intermediate English level is required.

Rules for evaluation and completion of the course

The maximum of 40 points is given upon completion of the  tests in laboratories. The requirements on the completion of the tasks in laboratories are described in the annual supervisor’s notice.  The maximum of 60 points can be gained during the final exam.  


The conditions for the successful course completion are stated in the yearly updated supervisor’s notice.

Aims

The goal of the course is to extend the introductory cryptology courses and to provide students with deeper knowledge of advanced principles of modern cryptology and English terminology. Students will learn the principles of selected building blocks of modern cryptographic protocols and schemes and will be able to understand English information sources during their further studies.
Students will obtain theoretical knowledge of main primitives used in modern cryptography, in particular of commitment schemes, zero-knowledge protocols, sigma-protocols and advanced schemes built using these primitives. After course completion, students will be able to:

Explain in English the principles of cryptographic commitments, zero-knowledge protocols and sigma protocols.
Design the interactive proof of knowledge protocols.
Use the commitment schemes in complex cryptosystems.
Evaluate speed and computational efficiency of standard proof of knowledge protocols.
Explain in English the principles of attribute authentication systems and eCash systems.

Study aids

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

DAMGAARD, I.; NIELSEN, J. B. Commitment Schemes and Zero-Knowledge Protocols [online]. Dostupné z: https://cs.au.dk/~ivan/CPT.html (EN)
DAMGAARD, I. On Σ-protocols [online]. Dostupné z: https://cs.au.dk/~ivan/CPT.html (EN)
GARRETT, Paul. Making, breaking codes: an introduction to cryptology. Vyd. 1. Upper Saddle River: Prentice Hall, 2001, xix, 523 s. ISBN 01-303-0369-0. (EN)
MENEZES, Alfred J. Handbook of applied cryptography. Vyd. 1. Boca Raton: CRC Press, 1997, 780 s. ISBN 08-493-8523-7. Online https://cacr.uwaterloo.ca/hac/. (EN)
OCHODKOVÁ, Eliška. Matematické základy kryptografických algoritmů [online]. [cit. 2013-06-11]. Dostupné z: http://mi21.vsb.cz/sites/mi21.vsb.cz/files/unit/mat_zaklady_kryptografickych_algoritmu.pdf (CS)
STALLINGS, William. Cryptography and network security: principles and practice. Seventh edition. xix, 731 pages. ISBN 9781292158587. (EN)

Recommended reading

Not applicable.

Elearning

Type of course unit

 

Lecture

26 hod., optionally

Teacher / Lecturer

Syllabus

1. Introduction exercise.
2. Basic cryptographic primitives overview.
3. Commitment schemes.
4. Use of cryptographic commitment schemes in protocol construction.
5. Interactive proof systems.
6. Zero-knowledge protocols.
7. Sigma protocols.
8. Interactive and non-interactive proofs of knowledge.
9. Group signatures.
10. Attribute-based credentials. 

Fundamentals seminar

26 hod., compulsory

Teacher / Lecturer

Syllabus

1. Introduction exercise.
2. Basic cryptographic primitives overview.
3. Commitment schemes.
4. Use of cryptographic commitment schemes in protocol construction.
5. Interactive proof systems.
6. Zero-knowledge protocols.
7. Sigma protocols.
8. Interactive and non-interactive proofs of knowledge.
9. Group signatures.
10. Attribute-based credentials. 

Elearning