Course detail

Modern Cryptography

FEKT-MPA-MOKAcad. year: 2022/2023

The course covers the topics of modern cryptography and its concrete applications. In particular, the course covers: post-quantum cryptography, lattice-based cryptography, cloud computing, secure data processing, homomorphic encryption, secure multi-party computation, secret sharing, e-voting, blockchain, cryptocurrencies, data privacy, and disclosure risk control.

Language of instruction

English

Number of ECTS credits

6

Mode of study

Not applicable.

Learning outcomes of the course unit

Students will obtain theoretical and practical knowledge on current modern cryptography and its concrete applications. In particular, the course focuses on post-quantum cryptography, cloud computing, secure data processing, e-voting, cryptocurrencies, and data privacy.
By passing the course, students will be able to develop modern cryptographic systems based on the topics explained in the course.

Prerequisites

Students must have a background in cryptography, algebra and programming equivalent to the knowledge provided by compulsory courses ZKR, CPT or AKR of the Bachelor’s program BPC-IBE.

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Teaching methods include lectures and computer laboratories. The course is taking advantage of the e-learning (Moodle) system. Teaching methods depend on the type of course unit as specified in article 7 of the BUT Rules for Studies and Examinations.

Assesment methods and criteria linked to learning outcomes

The maximum of 40 points is given upon completion of the laboratories. The maximum of 60 points can be gained by completing the final project.

Course curriculum

1. Introduction
2. Post-quantum cycles: Lattice-based Cryptography
3. Post-quantum cycles: LWE and RLWE Problems
4. Post-quantum cycles: Kyber, Saber and Dilithium
5. Secure computation cycles: Homomorphic Encryption
6. Secure computation cycles: Fully Homomorphic Encryption and Applications
7. Secure computation cycles: Secret Sharing
8. Secure computation cycles: Secure Multiparty Computation
9. Decentralized systems cycles: Blockchain and Smart Contracts
10. Decentralized systems cycles: Cryptocurrencies
11. Data Privacy cycles: Data Anonymization
12. Data Privacy cycles: Differential Privacy, k-anonymity and Record Linkage

Work placements

Not applicable.

Aims

The objective of this course is to provide students with detailed theoretical and practical knowledge of modern cryptographic schemes and their concrete application. The course places great emphasis on practical exercises, where students can try and implement individual technologies themselves.

Specification of controlled education, way of implementation and compensation for absences

The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

Bernstein, D.J., Buchmann, J., Dahmen, E.: Post-Quantum Cryptography. Springer. (EN)
Schoenmakers, B.: Lecture Notes Cryptographic Protocols. Technical University of Eindhoven. (EN)
Goldreich, O.: Foundations of Cryptography Volume 2 - Basic Applications. Cambridge University Press. (EN)
Hundepool, A., Domingo-Ferrer, J., et al.: Statistical disclosure control. John Wiley & Sons. (EN)

Recommended reading

Not applicable.

eLearning

Classification of course in study plans

  • Programme MPC-IBE Master's, 2. year of study, winter semester, compulsory-optional

Type of course unit

 

Lecture

26 hours, optionally

Teacher / Lecturer

Exercise in computer lab

26 hours, compulsory

Teacher / Lecturer

eLearning