No more courses offered
Starting from winter semester 2022/2023 our group will no longer be offering courses.
Symmetric Cryptography
Instructor: Dr. Jean Paul Degabriele
Event type: Integrated Course
Displayed in timetable as: Symmetric Cryptography (Symmetrische Kryptographie)
Hours per week: 4
Language of instruction: English
Teaching content
This course will cover the main principles of symmetric cryptography through which the design of modern symmetric cryptographic primitives can be understood. The focus will be on the design of AES and block ciphers more generally, cryptographic hash functions, universal hash functions, message authentication codes, tweakable block ciphers, authenticated encryption schemes, and encryption schemes for dedicated applications like disk encryption. Specifically, we will study state-of-the-art cryptographic designs such as GCM, HMAC, OCB, SHA3, and SIV that are in use today.
The course will be delivered using the provable security methodology, meaning that a large portion of it will consist of security definitions and mathematical proofs. This will allow the students to understand the ideas behind the design of such schemes, what security they provide, and how to use them correctly. Thus while the course is mostly self-contained, students are expected to be mathematically mature.
The course will also include an applied component, where we will cover practical attacks on real-world systems.
Prerequisites
It is recommended to have attended at least one of the following courses: Introduction to Cryptography, Real-World Cryptography, and Cryptoplexity.
Symmetric Cryptography
Instructor: Dr. Jean Paul Degabriele
Event type: Integrated Course
Displayed in timetable as: Symmetric Cryptography (Symmetrische Kryptographie)
Hours per week: 4
Language of instruction: English
Teaching content
This course will cover the main principles of symmetric cryptography through which the design of modern symmetric cryptographic primitives can be understood. The focus will be on the design of AES and block ciphers more generally, cryptographic hash functions, universal hash functions, message authentication codes, tweakable block ciphers, authenticated encryption schemes, and encryption schemes for dedicated applications like disk encryption. Specifically, we will study state-of-the-art cryptographic designs such as GCM, HMAC, OCB, SHA3, and SIV that are in use today.
The course will be delivered using the provable security methodology, meaning that a large portion of it will consist of security definitions and mathematical proofs. This will allow the students to understand the ideas behind the design of such schemes, what security they provide, and how to use them correctly. Thus while the course is mostly self-contained, students are expected to be mathematically mature.
The course will also include an applied component, where we will cover practical attacks on real-world systems.
Prerequisites
It is recommended to have attended at least one of the following courses: Introduction to Cryptography, Real-World Cryptography, and Cryptoplexity.