Code: | CC442 | Acronym: | CC442 |
Keywords | |
---|---|
Classification | Keyword |
OFICIAL | Computer Science |
Active? | Yes |
Web Page: | http://www.dcc.fc.up.pt/~rvr/aulas/code/Cripto-13-14/ |
Responsible unit: | Department of Computer Science |
Course/CS Responsible: | Master's Degree in Network and Information Systems Engineering |
Acronym | No. of Students | Study Plan | Curricular Years | Credits UCN | Credits ECTS | Contact hours | Total Time |
---|---|---|---|---|---|---|---|
M:CC | 15 | PE do Mestrado em Ciência de Computadores | 1 | - | 7,5 | 67 | 202,5 |
2 | |||||||
MI:ERS | 15 | Plano de Estudos a partir de 2007 | 4 | - | 7,5 | 67 | 202,5 |
Cryptography has evolved, in the as decades, from an obscure branch of knowledge used only by military departments and spies to an essential component of digital communication and software writing. With the dematerialisation of a large number of human activities, it is crucial to use cryptography to ensure a large set of properties that are inherent to "real life" activities. This is why cryptography has such an essential role both in internet protocols as in other digital communication systems.
The objective is:
1- Understand the security problem with computer networks as well as security problems in general.
2 - To get acquainted to a sufficient large set of cryptographic protocols such that it is possible to port "real life" activities to the digital realm.
3- The study of cryptographic algorithms and their possible applications.
At the end of the course, the students are expected to:
1- Choose what protocols and products should be used, both at the role of users and at the role of system or network administrators.
2- Analyse, modify, choose and implement the necessary protocols to the implementation of a practical solution for a problem.
3- Implement the cryptographic algorithms studied during the course.
4- Implement some attacks to some of the algorithms and protocols studied.
Crypographic protocols. Classic Cryptography and Cryptanalysis. Mono-alphabetic and poly-alphabetic substitution cyphers. Transposition cyphers. Electromechanical cyphers: the enigma and Lorentz. Block cypher. Feistel cyphers. DES and AES. Symetric cypher algorithms. Public Key crypto-systems. Random generators. Cryptographic hash functions. Quantum cryptography and cryptanalysis.
Problems related with the subject of the course are introduced, as well as the known solutions for these problems. After this, students are challenged either to implement some of the algorithms studied in the course in the context of a concrete application, or to perform some attack to a particular application.
designation | Weight (%) |
---|---|
Participação presencial | 0,00 |
Teste | 60,00 |
Trabalho laboratorial | 40,00 |
Total: | 100,00 |
Final grading formula:
Grade of the practical assignments * 0.4 + grade of the final test * 0.6.
Final exam