explain the purpose and the typical use cases for modern cryptographic primitives,
identify common issues when applying or implementing cryptographic primitives. For example, the use of weak randomness generators, or padding oracle attacks
recognize the importance of cryptographic agility at the example of post-quantum cryptography
Modulverantwortung:
Dr. Tschudi Daniel
Lehrpersonen:
Dr. Tschudi Daniel
Standort (angeboten):
Rapperswil-Jona
Modultyp:
Wahlpflicht-Modul für Informatik STD_21(Empfohlenes Semester: 4)Kategorien:Aufbau (I_Auf), Informatik (I_Inf)
Wahlpflicht-Modul für Informatik STD_23(Empfohlenes Semester: 4)Kategorien:Aufbau (I_Auf), Informatik (I_Inf)
explain the purpose and the typical use cases for modern cryptographic primitives,
identify common issues when applying or implementing cryptographic primitives. For example, the use of weak randomness generators, or padding oracle attacks
recognize the importance of cryptographic agility at the example of post-quantum cryptography
Modul- und Lerninhalt:
Randomness Generation, PRNG, PRF
Cryptographic Security
Block & Stream Ciphers
Hash Functions
HMAC, CMAC
Signature schemes
Key Exchange
Post-quantum cryptography
(Topic of the Year: E.g. zero-knowledge proofs)
Lehrmittel/-materialien:
The lecture follows “Serious Cryptography” 2nd edition by Jean-Philippe Aumasson