FEKT-MPA-MOKAcad. year: 2021/2022
The course covers the topics of modern cryptography and its concrete applications. In particular, the course covers: post-quantum cryptography, lattice-based cryptography, cloud computing, secure data processing, homomorphic encryption, secure multi-party computation, secret sharing, e-voting, blockchain, cryptocurrencies, data privacy, and disclosure risk control.
Learning outcomes of the course unit
Students will obtain theoretical and practical knowledge on current modern cryptography and its concrete applications. In particular, the course focuses on post-quantum cryptography, cloud computing, secure data processing, e-voting, cryptocurrencies, and data privacy.
By passing the course, students will be able to develop modern cryptographic systems based on the topics explained in the course.
Students must have a background in cryptography, algebra and programming equivalent to the knowledge provided by compulsory courses ZKR, CPT or AKR of the Bachelor’s program BPC-IBE.
Recommended optional programme components
Recommended or required reading
Bernstein, D.J., Buchmann, J., Dahmen, E.: Post-Quantum Cryptography. Springer. (EN)
Schoenmakers, B.: Lecture Notes Cryptographic Protocols. Technical University of Eindhoven. (EN)
Goldreich, O.: Foundations of Cryptography Volume 2 - Basic Applications. Cambridge University Press. (EN)
Hundepool, A., Domingo-Ferrer, J., et al.: Statistical disclosure control. John Wiley & Sons. (EN)
Planned learning activities and teaching methods
Teaching methods include lectures and computer laboratories. The course is taking advantage of the e-learning (Moodle) system. Teaching methods depend on the type of course unit as specified in article 7 of the BUT Rules for Studies and Examinations.
Assesment methods and criteria linked to learning outcomes
Evaluation of study results follows the Rules for Studies and Examinations of BUT and the Dean's Regulation complementing the Rules for Studies and Examinations of BUT.
Language of instruction
1. Post-quantum cycles: Introduction to Post-Quantum Cryptography
2. Post-quantum cycles: Lattice-based Cryptography
3. Post-quantum cycles: LWE and RLWE Problems
4. Post-quantum cycles: CRYSTALS-Dilithium Signatures
5. Secure computation cycles: Homomorphic Encryption
6. Secure computation cycles: Fully Homomorphic Encryption and Applications
7. Secure computation cycles: Secret Sharing and Secure Multiparty Computation
8. Secure computation cycles: Secure Multiparty Computation in e-voting and cloud computing
9. Decentralized systems cycles: Blockchain and Smart Contracts
10. Decentralized systems cycles: Cryptocurrencies
11. Data Privacy cycles: Data Anonymization
12. Data Privacy cycles: Differential Privacy, k-anonymity and Record Linkage
The objective of this course is to provide students with detailed theoretical and practical knowledge of modern cryptographic schemes and their concrete application. The course places great emphasis on practical exercises, where students can try and implement individual technologies themselves.
Specification of controlled education, way of implementation and compensation for absences
The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.
Classification of course in study plans
- Programme MPC-IBE Master's, 2. year of study, winter semester, 6 credits, compulsory-optional