Course detail
Modern Cryptography
FEKT-MPA-MOKAcad. year: 2024/2025
The course covers the topics of modern cryptography and its concrete applications. In particular, the course covers: post-quantum cryptography, lattice-based cryptography, cloud computing, secure data processing, homomorphic encryption, secure multi-party computation, secret sharing, e-voting, blockchain, cryptocurrencies, data privacy, and disclosure risk control.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Entry knowledge
Rules for evaluation and completion of the course
The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.
Aims
Students will obtain theoretical and practical knowledge on current modern cryptography and its concrete applications. In particular, the course focuses on post-quantum cryptography, cloud computing, secure data processing, e-voting, cryptocurrencies, and data privacy.
By passing the course, students will be able to develop modern cryptographic systems based on the topics explained in the course.
Study aids
Prerequisites and corequisites
Basic literature
Goldreich, O.: Foundations of Cryptography Volume 2 - Basic Applications. Cambridge University Press. (EN)
Hundepool, A., Domingo-Ferrer, J., et al.: Statistical disclosure control. John Wiley & Sons. (EN)
Schoenmakers, B.: Lecture Notes Cryptographic Protocols. Technical University of Eindhoven. (EN)
Recommended reading
Elearning
Classification of course in study plans
- Programme MPC-IBE Master's 2 year of study, winter semester, compulsory-optional
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
1. Post-quantum cycles: Introduction
2. Post-quantum cycles: Lattice-based Cryptography
3. Post-quantum cycles: LWE and RLWE Problems
4. Post-quantum cycles: Kyber, Saber and Dilithium
5. Secure computation cycles: Homomorphic Encryption
6. Secure computation cycles: Fully Homomorphic Encryption and Applications
7. Secure computation cycles: Secret Sharing
8. Secure computation cycles: Secure Multiparty Computation
9. Decentralized systems cycles: Blockchain and Smart Contracts
10. Decentralized systems cycles: Cryptocurrencies
11. Data Privacy cycles: Data Anonymization
12. Data Privacy cycles: Differential Privacy, k-anonymity and Record Linkage
Exercise in computer lab
Teacher / Lecturer
Syllabus
Laboratory 1 - Introduction to python
Laboratory 2 - Numpy library and Lattice
Laboratory 3 - LWE problem and Regev scheme
Laboratory 4 - PQC
Laboratory 5 - Homomorphic Encryption
Laboratory 6 - Fully Homomorphic Encryption and Applications
Laboratory 7 - Secret Sharing
Laboratory 8 - Secure Multiparty Computation
Laboratory 9 - Blockchain & Project Discussion
Laboratory 10 - Smart Contracts and Cryptocurrencies
Laboratory 11 - Data Anonymization
Laboratory 12 - K-anonymity
Elearning