Crypto course
The course Fundamentals of Cryptography provide a complete introduction to modern cryptography held at JKU Linz.
The course is on Mondays, 12:00-13:30.
Due to the current situation, the lecture is moved to online.
Links and password to the lecture will be send out. Meeting details (link, meeting ID, except password) will also published here.
You can join to lecture here, Meeting ID: 937 3175 5892
Literature
The course mainly based on
J. Katz and Y. Lindell, Introduction to modern cryptography, 2nd edition, CRC Press 2015
however the the lecture is self-contained.
Interested students can also consult with the following books:
D. Boneh and V. Shoup, A graduate course in applied cryptography
A. J. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of applied cryptography
B. Schneier, Applied cryptography, John Wiley & Sons, 1994.
B. Schneier, Secrets and lies , John Wiley & Sons, 2000.
For historical background of cryptography:
Simon Singh, The code book, Fourth Estate, 2002
For mathematical background, see Chapters 2 and 4 of Handbook of applied cryptography, especially for Probability theory (Section 2.1), for Number theory (Section 2.4, including Algorithm 2.107 for Extended Euclidean algorithm) and for Primality test (Chapter 4).
Lectures
05.10.2020 (Room HS9): Informal Introduction to Security, slides.
12.10.2020 (Room HF 9901): Formal introduction to Modern Cryptography, slides. Perfectly secret encryption, slides.
19.10.2020 (Room HF 9901): Symmetric-key cryptography I. Stream ciphers, slides (5 more slides added), handout (EAV-security of stream ciphers).
09.11.2020 (Zoom): Symmetric-key cryptography II. Block ciphers, slides (corrections on slides 5 and 10).
16.11.2020 (Zoom): Symmetric-key cryptography II. Block ciphers 2 (slides of this lecture added to the previous one), Symmetric-key cryptography III. Mode of operation.
23.11.2020 (Zoom): Symmetric-key cryptography III. Mode of operation 2, slides, Symmetric-key cryptography IV. MAC, summary, slide (updated).
30.11.2020 (Zoom): Symmetric-key cryptography V. Authenticated encryption, summary, slides
07.12.2020 (Zoom): Hash functions, slides
14.12.2020 (Zoom): Public key cryptography I, Introduction, summary
11.01.2021 (Zoom): Public key cryptography II, Diffie-Hellman key exchange protocol and El Gamal encryption, summary, slides (there are corrections compared to the summary)
18.01.2021 (Zoom) Public key cryptography III, RSA, summary, slides
25.01.2021 (Zoom) Public key cryptography IV, Digital signatures, PGP, summary, slides
Preliminary Contents
Introduction to cryptography
Symmetric-key cryptography I. Stream ciphers
Symmetric-key cryptography II. Block ciphers
Symmetric-key cryptography III. Modes of operation
Symmetric-key cryptography IV. MAC -- Messages Authentication Codes
Symmetric-key cryptography V. Authenticated encryption
Hash functions
Public key cryptography I., ElGamal
Public key cryptography II. RSA
Public key cryptography III. Digital signatures
Examination
Students get a grade by solving exercises. (25.01.2020, complete.)
The solutions are required to be sent encrypted and signed with GPG/PGP, you can download my public key from here. (It is enough to attach the encrypted and signed pdf document to a plain mail.) If you are using Linux, you can easily install GnuPG. For Windows you can user GPG4win, for MAC-OS you can use PGP Suite.
Tutorials and documentation for GPG.
In case of request, online oral exam is also possible.