03LPYOV

A.A. 2020/21

2020/21

Cryptography

This is a first course of Cryptography. It is about the state-of-the-art of the principal cryptographic algorithms currently used for computer system security purposes.

Cryptography

This is a first course of Cryptography. It is about the state-of-the-art of the principal cryptographic algorithms currently used for computer system security purposes.

Cryptography

Students are expected to learn: Cryptographic programming. Symmetric cryptography primitives as: Block Ciphers, Stream Ciphers and Hash Functions. Asymmetric cryptosystems as: Key Exchange, Public Key Cryptography Protocols as: DSA, SRP and SAE.

Cryptography

Students are expected to learn: Cryptographic programming. Symmetric cryptography primitives as: Block Ciphers, Stream Ciphers and Hash Functions. Asymmetric cryptosystems as: Key Exchange, Public Key Cryptography Protocols as: DSA, SRP and SAE.

Cryptography

Basics of programming in C. Basics of computer security. Basics of linear algebra as in courses of "Linear Algebra and Geometry" of the first year.

Cryptography

Basics of programming in C. Basics of computer security. Basics of linear algebra as in courses of "Linear Algebra and Geometry" of the first year.

Cryptography

Cryptographic programming: use of cryptographic primitives in C. use of cryptographic primitives in python. Symmetric Cryptography: Block-Ciphers: DES, AES. Operations Modes: ECB,CBC,CTR,OFB,CFB,GCM,CCM. Stream-Ciphers and PRNG: ARX algorithms: RC4, Salsa e Chacha20. Permutation algorithm: Sponge PRNG Hash Functions: ARX : SHA1, SHA2 Permutation: SHA3 Asymmetric Cryptography: DH Key Exchange on finite fields. DH on elliptic curves. RSA. Protocols: DSA,SAE and SRP.

Cryptography

Cryptographic programming: use of cryptographic primitives in C. use of cryptographic primitives in python. Symmetric Cryptography: Block-Ciphers: DES, AES. Operations Modes: ECB,CBC,CTR,OFB,CFB,GCM,CCM. Stream-Ciphers and PRNG: ARX algorithms: RC4, Salsa e Chacha20. Permutation algorithm: Sponge PRNG Hash Functions: ARX : SHA1, SHA2 Permutation: SHA3 Asymmetric Cryptography: DH Key Exchange on finite fields. DH on elliptic curves. RSA. Protocols: DSA,SAE and SRP.

Cryptography

Cryptography

Cryptography

40 hs of Lectures. 20 hs of Exercises.

Cryptography

40 hs of Lectures. 20 hs of Exercises.

Cryptography

Serious Cryptography: A Practical Introduction to Modern Encryption Jean-Philippe Aumasson, No Starch Press, 2018. Understanding Cryptography, A Textbook for Students and Practitioners Paar, Christof, Pelzl, Jan, Springer-Verlag, 2010. Applied Cryptography: Protocols, Algorithms and Source Code in C Bruce Schneier, Wiley; 20th Anniversary edition,2015.

Cryptography

Serious Cryptography: A Practical Introduction to Modern Encryption Jean-Philippe Aumasson, No Starch Press, 2018. Understanding Cryptography, A Textbook for Students and Practitioners Paar, Christof, Pelzl, Jan, Springer-Verlag, 2010. Applied Cryptography: Protocols, Algorithms and Source Code in C Bruce Schneier, Wiley; 20th Anniversary edition,2015.

Cryptography

**Modalitą di esame:** Prova orale facoltativa; Prova scritta tramite PC con l'utilizzo della piattaforma di ateneo;

Cryptography

The final exam is a written test with open and closed answers to be carried out via PC. An oral exam is optional at the request of the student or at the discretion of the teacher. During the written test students cannot consult books, notes or other teaching materials. The written test is considered passed if its result is greater than or equal to 18/30. Only students who have passed the written test can ask to take the oral test as well. If requested, the oral test contributes to determine the final result of the exam together with the written one.

Cryptography

**Exam:** Optional oral exam; Computer-based written test using the PoliTo platform;

Cryptography

The final exam is a written test with open and closed answers to be carried out via PC. An oral exam is optional at the request of the student or at the discretion of the teacher. During the written test students cannot consult books, notes or other teaching materials. The written test is considered passed if its result is greater than or equal to 18/30. Only students who have passed the written test can ask to take the oral test as well. If requested, the oral test contributes to determine the final result of the exam together with the written one.

Cryptography

**Modalitą di esame:** Prova scritta (in aula); Prova orale facoltativa; Prova scritta tramite PC con l'utilizzo della piattaforma di ateneo;

Cryptography

The final exam is a written test with open and closed answers. An oral exam is optional at the request of the student or at the discretion of the teacher. During the written test students cannot consult books, notes or other teaching materials. The written test is considered passed if its result is greater than or equal to 18/30. Only students who have passed the written test can ask to take the oral test as well. If requested, the oral test contributes to determine the final result of the exam together with the written one.

Cryptography

**Exam:** Written test; Optional oral exam; Computer-based written test using the PoliTo platform;

Cryptography

The final exam is a written test with open and closed answers. An oral exam is optional at the request of the student or at the discretion of the teacher. During the written test students cannot consult books, notes or other teaching materials. The written test is considered passed if its result is greater than or equal to 18/30. Only students who have passed the written test can ask to take the oral test as well. If requested, the oral test contributes to determine the final result of the exam together with the written one.

© Politecnico di Torino

Corso Duca degli Abruzzi, 24 - 10129 Torino, ITALY

Corso Duca degli Abruzzi, 24 - 10129 Torino, ITALY