|Number of semesters||1|
|Teaching language|| |
|Study level||Postgraduate Courses|
|Belongs to||Department of Informatics|
Objectives and Content
The course is an extension of the theory of cryptology given in INF240. The course deals with the construction of and the attack on some cryptographic ciphers, cryptographic hash functions, and digital signatures.
We will also look at other topics within cryptology- the selection will vary from time to time. Examples of such topics are authentication codes, elliptic curve cryptography, secret sharing systems, zero-knowledge proofs, random number generators, secure multicasting, and information theoretical tools.
I 247: 10 ECTS
Compulsory Assignments and Attendance
Compulsory assignments are valid two semesters, the semester of the approval and the following semester.
Semester of Instruction
After completing the course the student should be able to
- Explain the mathematical foundation for and construction of central ciphers, hash functions, and digital signatures.
- Implement standard cryptographic systems.
- Digest and explain cryptographic algorithms.
Required Previous Knowledge
At least 60 ECTS in computer science, preferably including some mathematics
Recommended Previous Knowledge
Forms of Assessment
It is opportunity for grades on exercises, which can be included in the final grade. Oral exam. If the course has many participants, there can be written exam.
The grading scale used is A to F. Grade A is the highest passing grade in the grading scale, grade F is a fail.