03LPYOV

A.A. 2019/20

2019/20

Cryptography

This is a first course of Cryptography. It is about the state-of-the-art of the principal cryptographic algorithms currently used for computer system security purposes.

Cryptography

This is a first course of Cryptography. It is about the state-of-the-art of the principal cryptographic algorithms currently used for computer system security purposes.

Cryptography

Students are expected to learn: Cryptographic programming. Symmetric cryptography primitives as: Block Ciphers, Stream Ciphers and Hash Functions. Asymmetric cryptosystems as: Key Exchange, Public Key Cryptography Protocols as: DSA, SRP and SAE.

Cryptography

Students are expected to learn: Cryptographic programming. Symmetric cryptography primitives as: Block Ciphers, Stream Ciphers and Hash Functions. Asymmetric cryptosystems as: Key Exchange, Public Key Cryptography Protocols as: DSA, SRP and SAE.

Cryptography

Basics of programming in C. Basics of computer security. Basics of linear algebra as in courses of "Linear Algebra and Geometry" of the first year.

Cryptography

Basics of programming in C. Basics of computer security. Basics of linear algebra as in courses of "Linear Algebra and Geometry" of the first year.

Cryptography

Cryptographic programming: use of cryptographic primitives in C. use of cryptographic primitives in python. Symmetric Cryptography: Block-Ciphers: DES, AES. Operations Modes: ECB,CBC,CTR,OFB,CFB,GCM,CCM. Stream-Ciphers and PRNG: ARX algorithms: RC4, Salsa e Chacha20. Permutation algorithm: Sponge PRNG Hash Functions: ARX : SHA1, SHA2 Permutation: SHA3 Asymmetric Cryptography: DH Key Exchange on finite fields. DH on elliptic curves. RSA. Protocols: DSA,SAE and SRP.

Cryptography

Cryptographic programming: use of cryptographic primitives in C. use of cryptographic primitives in python. Symmetric Cryptography: Block-Ciphers: DES, AES. Operations Modes: ECB,CBC,CTR,OFB,CFB,GCM,CCM. Stream-Ciphers and PRNG: ARX algorithms: RC4, Salsa e Chacha20. Permutation algorithm: Sponge PRNG Hash Functions: ARX : SHA1, SHA2 Permutation: SHA3 Asymmetric Cryptography: DH Key Exchange on finite fields. DH on elliptic curves. RSA. Protocols: DSA,SAE and SRP.

Cryptography

Cryptography

Cryptography

40 hs of Lectures. 20 hs of Exercises.

Cryptography

40 hs of Lectures. 20 hs of Exercises.

Cryptography

Serious Cryptography: A Practical Introduction to Modern Encryption Jean-Philippe Aumasson, No Starch Press, 2018. Understanding Cryptography, A Textbook for Students and Practitioners Paar, Christof, Pelzl, Jan, Springer-Verlag, 2010. Applied Cryptography: Protocols, Algorithms and Source Code in C Bruce Schneier, Wiley; 20th Anniversary edition,2015.

Cryptography

Serious Cryptography: A Practical Introduction to Modern Encryption Jean-Philippe Aumasson, No Starch Press, 2018. Understanding Cryptography, A Textbook for Students and Practitioners Paar, Christof, Pelzl, Jan, Springer-Verlag, 2010. Applied Cryptography: Protocols, Algorithms and Source Code in C Bruce Schneier, Wiley; 20th Anniversary edition,2015.

Cryptography

**Modalitą di esame:** Prova scritta (in aula); Prova orale facoltativa;

Cryptography

Cryptography

**Exam:** Written test; Optional oral exam;

Cryptography

Written test; optional request of oral test; The final exam is written. An oral test is optional at the request of the student or at the discretion of the teacher. The written test is considered passed if its result is greater than or equal to 18/30. Only students who have passed the written test can opt to take the oral exam. If requested, the oral exam contributes to determine the final grade together with the written one. Attending the oral exam can lead to both the raising or the lowering of the grade obtained in the written exam.

© Politecnico di Torino

Corso Duca degli Abruzzi, 24 - 10129 Torino, ITALY

Corso Duca degli Abruzzi, 24 - 10129 Torino, ITALY