Courses


Symmetric Cryptography

20-00-1107-iv – Link to TUCaN

Instructor: Dr. Jean Paul Degabriele
Event type: Integrated Course
Displayed in timetable as: Symmetric Cryptography (Symmetrische Kryptographie)
Hours per week: 4
Language of instruction: English


Teaching content

This course will cover the main principles of symmetric cryptography through which the design of modern symmetric cryptographic primitives can be understood. The focus will be on the design of AES and block ciphers more generally, cryptographic hash functions, universal hash functions, message authentication codes, tweakable block ciphers, authenticated encryption schemes, and encryption schemes for dedicated applications like disk encryption. Specifically, we will study state-of-the-art cryptographic designs such as GCM, HMAC, OCB, SHA3, and SIV that are in use today.

The course will be delivered using the provable security methodology, meaning that a large portion of it will consist of security definitions and mathematical proofs. This will allow the students to understand the ideas behind the design of such schemes, what security they provide, and how to use them correctly. Thus while the course is mostly self-contained, students are expected to be mathematically mature.

The course will also include an applied component, where we will cover practical attacks on real-world systems.


Prerequisites

It is recommended to have attended at least one of the following courses: Introduction to Cryptography, Real-World Cryptography, and Cryptoplexity.

Basics of Symmetric Cryptographic Design

20-00-1062-vl – Link to TUCaN


Instructors: Dr. Jean Paul Degabriele
Event type: Lecture
Org-unit: Dept. 20 – Computer Science
Displayed in timetable as: Symmetric Crypto
Hours per week: 2
Language of instruction: Englisch


Teaching content

This course will introduce students to the basic principles behind symmetric cryptographic design. The focus will be on the design of various types of encryption schemes, collision-resistant hash functions, and message authentication codes from lower primitives such as block ciphers and universal hash functions. Specifically, we will study state-of-the-art cryptographic designs such as GCM, HMAC, OCB, SHA3, and SIV that are in use today. The course will be delivered using the provable security methodology with an outlook on cryptographic practice, where we will also cover practical attacks on such cryptographic schemes. This course, however, will not cover the design of block ciphers nor their cryptanalysis.


Prerequisites

Recommended is at least one of: Introduction to Cryptography, Real-World Cryptography, and Cryptoplexity.