Course detail
Information Security Seminar
FEKT-VSIBAcad. year: 2019/2020
The course covers the topics of advanced cryptography and implementation of cryptographic algorithms used for assuring ICT system security. In particular, the course covers: formal proofs based on simulation paradigms, standard security model and random oracle security model, security definitions of signature schemes, security definitions of encryption schemes, security definitions of privacy-enhancing schemes, security frameworks (UC – Universal Composability Framework), implementation aspects of modern cryptographic schemes, particularly the commitment schemes, group signatures and privacy-enhancing schemes, such as attribute-based schemes.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
2. Random oracle model
3. Standard model
4. Universally Composable Framework
5. Formal definitions of encryption schemes
6. Formal definitions of basic cryptographic primitives schemes
7. Formal definitions of signature schemes
8. Formal definitions of privacy-enhancing schemes
9. Modern cryptographic schemes – group signatures
10. Modern cryptographic schemes – authentication, identification schemes
11. Modern cryptographic schemes – privacy protection
12. Implementation aspects of modern cryptography
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G., Neven, G. and Pedersen, M. ”Formal Treatment of Privacy-Enhancing Credential Systems", Selected Areas in Cryptography - SAC 2015, Sackville, New Brunswick, Canada, August 12–14, 2015.
Canetti, Ran. ”Universally composable security: a new paradigm for cryptographic protocols," Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on, 2001, pp. 136-145.
Damgård, I. (2007). "A "proof-reading" of Some Issues in Cryptography". Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007. Proceedings. LNCS 4596: 2–11
Koblitz, Neal; Menezes, Alfred J. (2015). “The Random Oracle Model: A Twenty-Year Retrospective” (PDF). Another Look. Retrieved 6 March 2015.
MENEZES, Alfred, Paul C VAN OORSCHOT a Scott A VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, c1997. Discrete mathematics and its applications. ISBN 0-8493-8523-7.
Recommended reading
Classification of course in study plans