Course detail
Information Security Seminar
FEKT-MPA-SIBAcad. year: 2024/2025
The course covers the topics of advanced cryptography and implementation of cryptographic algorithms used for assuring ICT system security. In particular, the course covers: formal proofs based on simulation paradigms, standard security model and random oracle security model, security definitions of signature schemes, security definitions of encryption schemes, security definitions of privacy-enhancing schemes, security frameworks (UC – Universal Composability Framework), implementation aspects of modern cryptographic schemes, particularly the commitment schemes, group signatures and privacy-enhancing schemes, such as attribute-based schemes.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Entry knowledge
Rules for evaluation and completion of the course
The conditions for the successful course completion are stated in the yearly updated supervisor’s notice.
Aims
By passing the course, students will get the knowledge of advanced cryptography, in particular of the trends in modern cryptographic protocol design. Students will obtain the skills necessary for secure design based on provable security using widely accepted formal models and definitions. Students will be able to design modern protocols and understand the specifications of upcoming cryptographic systems. By passing the course, students will learn the actual state in the implementation and use of cryptographic algorithms in real-world systems for assuring ICT security.
Study aids
Prerequisites and corequisites
Basic literature
MENEZES, Alfred, Paul C VAN OORSCHOT a Scott A VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, c1997. Discrete mathematics and its applications. ISBN 0-8493-8523-7.
Recommended reading
Elearning
Classification of course in study plans
- Programme MPC-IBE Master's 2 year of study, summer semester, compulsory
Type of course unit
Seminar
Teacher / Lecturer
Syllabus
1. Formal proofs of cryptographic system properties
2. Random oracle model
3. Standard model
4. Universally Composable Framework
5. Formal definitions of encryption schemes
6. Formal definitions of basic cryptographic primitives schemes
7. Formal definitions of signature schemes
8. Formal definitions of privacy-enhancing schemes
9. Modern cryptographic schemes – group signatures
10. Modern cryptographic schemes – authentication, identification schemes
11. Modern cryptographic schemes – privacy protection
12. Implementation aspects of modern cryptography
Elearning