Cryptographic algorithms and protocols
form the backbone of numerous security architectures. This course provides an
introduction to modern cryptography and communication security. It focuses on
how cryptographic algorithms and protocols work and how to use them. The course
covers the concepts of block ciphers and message authentication codes, public
key encryption, digital signatures, and key establishment, as well as common
examples and uses of such schemes, including the AES, RSA-OAEP, and the Digital
Signature Algorithm. Basic cryptanalytic techniques and examples of practical
security solutions are explored to understand how to design and evaluate modern
security solutions.
Intended learning outcomes
Knowledge &understand
Familiarize the student with some classical and modern encryption techniques.
Familiarize the student with methods used in breaking and analyzing ciphers.
Familiarize the student with cryptographic systems and services such as digital signature, data protection and integrity.
Familiarize the student with different authentication methods and secure network protocols.
mental skills
Distinguishing between secure and unsecure algorithms.
Classify the different algorithms and applications of cryptosystems.
Criticizing an encryption algorithm and proposes solutions to correct it.
Breaking a code and deducing from it the original message.
Links what has been studied with the applications available in the field of information and network security.
Practical & professional skills
Ability to cryptanalyze a ciphertext of some of the studied algorithms.
Encrypt and/or decrypt messages based on the studied algorithms.
Evaluating the level of security in a computer system and proposes solutions to improve it.
Designing a secure computer system or a secure network.
General and transferable skills
Written communication and writing reports.
Oral communication by giving presentations.
Use IT tools to solve problems.
Working in a team to complete a mini project.
Performing exams and handing in assignments on time (time management
Teaching and learning methods
Lectures
Tutorials
Homework
Group Presentation
Methods of assessments
Midterm exam = 25
Homework = 10
Group Presentation/Discussion = 15
Final exam = 50
Course contents
Introduction to cryptography: basic concepts and information security goals
Classical encryption methods: symmetric and asymmetric
Cryptanalysis of simple symmetric encryption methods