explain the purpose and the typical use cases for modern cryptographic primitives,
identify common issues when applying or implementing cryptographic primitives. For example, the use of weak randomness generators, or padding oracle attacks
recognize the importance of cryptographic agility at the example of post-quantum cryptography
explain the purpose and the typical use cases for modern cryptographic primitives,
identify common issues when applying or implementing cryptographic primitives. For example, the use of weak randomness generators, or padding oracle attacks
recognize the importance of cryptographic agility at the example of post-quantum cryptography
Plan und Lerninhalt:
Randomness Generation, PRNG, PRF
Cryptographic Security
Block & Stream Ciphers
Hash Functions
HMAC, CMAC
Signature schemes
Key Exchange
Post-quantum cryptography
(Topic of the Year: E.g. zero-knowledge proofs)
Ansprechspersonen:
Dr. Tschudi Daniel
Unterrichtssprache:
Englisch
Bibliographie:
The lecture follows “Serious Cryptography” 2nd edition by Jean-Philippe Aumasson