Course syllabus

# CryptographyKryptoteknik

## EDIN01, 7.5 credits, A (Second Cycle)

Valid for: 2024/25
Faculty: Faculty of Engineering LTH
Decided by: PLED C/D
Date of Decision: 2024-04-16
Effective: 2024-05-08

## General Information

Depth of study relative to the degree requirements: Second cycle, in-depth level of the course cannot be classified
Elective for: C4-ks, C4-sec, D4-ns, E4-ks, F4, F4-kv, MMSR2, MSOC1, MWIR2, Pi4-pv
Language of instruction: The course will be given in English on demand

## Aim

This course is intended to be an introduction to the fascinating subject of cryptography. It provides both a firm ground in the fundamentals and a feel for advanced subjects for anyone interested in employing cryptography in the area of data security.

## Learning outcomes

Knowledge and understanding
For a passing grade the student must

• be able to describe different building blocks used in cryptology,
• be able to describe the general problems that are addressed by cryptology,
• be able to explain the principles behind different cryptographic primitives.

Competences and skills
For a passing grade the student must

• be able to identify and formulate problems in the area of cryptology
• be able to provide descriptions of how cryptographic primitives can be used in security systems.
• be able to show that you are capable of choosing suitable parameters to cryptographic primitives as well as analyze various constructions from a security perspective.

Judgement and approach
For a passing grade the student must

## Contents

Classical cryptography: Introduction and basic notation, The Caesar cipher, simple substitution, polyalphabetic ciphers (Vigenére, Kasiski’s method, Vernam), transposition ciphers.

Shannon’s theory of secrecy: entropy, key and message equivocation, redundancy, unicity distance, perfect secrecy.

Shift register theory and stream ciphers: Finite fields, linear feedback shift register sequences, periods and cycle sets, shift register synthesis, nonlinear combinations of sequences, attacks on stream ciphers.

Block ciphers: Advanced Encryption Standard (AES), modes of operation.

Public key cryptography: Basic number theory, RSA, Diffie-Hellman key exchange, factoring, primality, digital signatures.

Hash functions: properties, collision attacks, the birthday paradox

Authentication codes: MAC constructions, Impersonation and substitution attacks.

Secret sharing: Shamir’s threshold scheme, general secret sharing, perfect and ideal schemes.

Projects: 1. Factoring. 2. Shift register sequences. 3. Correlation attacks.

## Examination details

Grading scale: TH - (U, 3, 4, 5) - (Fail, Three, Four, Five)
Assessment:

To pass the course three approved project works and a passed exam are required. The final grade is based on the results of the written exam.

The examiner, in consultation with Disability Support Services, may deviate from the regular form of examination in order to provide a permanently disabled student with a form of examination equivalent to that of a student without a disability.

Modules
Code: 0118. Name: Examination.
Credits: 4.5. Grading scale: TH - (U, 3, 4, 5). Assessment: Approved exam. The module includes: Written exam.
Code: 0218. Name: Projects.
Credits: 3.0. Grading scale: UG - (U, G). Assessment: Approved projects. The module includes: The course has three mandatory projects covering different parts of the course.

Assumed prior knowledge: A first course in programming. Basic mathemathics like linear algebra and probability theory.
The number of participants is limited to: No
Kursen överlappar följande kurser: EDI051