COURSE OUTLINE
Session 10
Second test.
Password-authenticated key agreement protocols: balanced, augmented
Session 7
Digital signatures (RSA, DSA, ECDSA, Lamport one-time signature scheme and post-quantum signature schemes based on its ideas)
Session 8
Authentication. Challenge-response protocols. Practical applications. Practical examples of AKE protocols; SIGMA protocols and their practical implementations
Session 11
RNGs and their failures, the case of security flaws in Estonian national ID cards, countermeasures. Backdoors and Bug doors
Session 12
Basics of side-channel attacks. Key lifetime, re-keying, and strengthened modes of operation. FDE
Session 9
TLS 1.2 handshake TLS 1.3 handshake. IPsec IKE.
Theoretical and practical attacks
Session 13
Foundations of smart cards and tokens security. HSMs and FIPS 140-2. PKI and PGP. Digital signature servers, eIDAS
Session 14
Foundations of blockchain technology. IoT and its challenges, Wi-Fi protocols and their future
Session 15
Final test
Session 1
Main principles of cryptography: historical overview and modern concepts of security.
Confidentiality. Adversary models for confidentiality
Session 4
AEAD modes of operation. Protecting channels with symmetric cryptography.
TLS Record. IPsec ESP
Session 5
First test.
Practice session: TLS Record; theoretical and practical attacks
Session 2
Stream ciphers (with examples, incl. A5). Block ciphers (with examples, incl. DES, AES) and modes of operations (incl. ECB, CBC, OFB, CFB, CTR)
Session 3
Integrity and authenticity. Adversary models and basic concepts. Hash functions (incl. SHA-2 and SHA-3) and MACs. Randomness
and pseudorandomness.
HMAC. PRFs, KDFs
Session 6
Public key encryption (RSA, ElGamal encryption system). FFC and ECC.
Key exchange protocols (DH(E), ECDH(E)). CMS encryption mechanisms based on EC