Applied Cryptography
Course objectives
Aims After the course, the student should understand the ideas and workings of public and secret-key cryptography in the IT security sector. Content The course covers the following topics: Symmetric cryptography: encryption, authentication, hashing, ... Public key cryptography and post-quantum cryptography: encryption, signatures, KEMS, ... Security notions like existential forgery, IND-CCA, zero-knowledge, etc. Security proofs Protocols, like challenge-response protocols, proofs of knowledge, etc. Real-world protocols, like TLS, secure messaging, etc.
- Lesson code10610042
- Academic year2025/2026
- CourseArtificial Intelligence
- CurriculumSingle curriculum
- Year1st year
- Semester2nd semester
- SSDING-INF/05
- CFU6