Cryptography I 1000-2M12KI1
1. Introduction to cryptography
2. Symmetric encryption
3. Hash functions and message authentication
4. Introduction to public key cryptography
5. Introduction to number theory and algebra
6. Public key encryption
7. Signature schemes
8. Informal introduction to advanced cryptographic protocols (commitment schemes, interactive and zero-knowledge proofs, secure multiparty computations)
Type of course
Requirements
Mathematical analysis for computer science I
Mathematical analysis for computer science II
Geometry with linear algebra
Languages, automata and computations
Discrete mathematics
Foundations of mathematics
Probability theory and statistics
Prerequisites
Prerequisites (description)
Course coordinators
Learning outcomes
Knowledge
1. Has knowledge about basics and main problems of modern cryptography.
2. Knows graph of implications between main cryptographical hipotesis.
3. Knows basis of the history of cryptography.
Skills
1. Can analyze security of cryptophical protocols.
2. Can propose safe and secure protocol to actual problem.
Competence
1. Understands the need for proving facts in cryptography.
2. Knows the limits: what is and what is not possible.
3. Can assess the suitability of various cryptographical protocols.
Assessment criteria
2024: To pass the course, you must pass the exercises and the exam.
To pass the exercises, you must :
• deliver homework and
• pass the mid-term exam
The passing of the exercises is decided by the instructor.
The exam is conducted in written form.
Both the mid-term exam and the exam will consist of two parts:
1. testing knowledge (no materials such as notes and books will be allowed on it)
2. testing skills (without the above restriction)
The final grade for the course will be determined (on the first date) based on the weighted average of the mid-term exam (50%) and the exam results (50%).
Lecture and exercise instructors may decide to increase the grade for particularly active students.
Bibliography
• Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography
• Dan Boneh and Victor Shoup A Graduate Course in Applied Cryptography
• Doug Stinson Cryptography Theory and Practice, Third Edition
• Stefan Dziembowski, slides from the web-page http://www.crypto.edu.pl/teaching/
Additional information
Information on level of this course, year of study and semester when the course unit is delivered, types and amount of class hours - can be found in course structure diagrams of apropriate study programmes. This course is related to the following study programmes:
- Bachelor's degree, first cycle programme, Computer Science
- Master's degree, second cycle programme, Computer Science
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: