COURSE OUTLINE

Session 10

Second test.
Password-authenticated key agreement protocols: balanced, augmented

Session 7

Digital signatures (RSA, DSA, ECDSA, Lamport one-time signature scheme and post-quantum signature schemes based on its ideas)

Session 8

Authentication. Challenge-response protocols. Practical applications. Practical examples of AKE protocols; SIGMA protocols and their practical implementations

Session 11

RNGs and their failures, the case of security flaws in Estonian national ID cards, countermeasures. Backdoors and Bug doors

Session 12

Basics of side-channel attacks. Key lifetime, re-keying, and strengthened modes of operation. FDE

Session 9

TLS 1.2 handshake  TLS 1.3 handshake. IPsec IKE.
Theoretical and practical attacks

Session 13

Foundations of smart cards and tokens security. HSMs and FIPS 140-2. PKI and PGP. Digital signature servers, eIDAS

Session 14

Foundations of blockchain technology. IoT and its challenges, Wi-Fi protocols and their future

Session 15

Final test

Session 1

Main principles of cryptography: historical overview and modern concepts of security.
Confidentiality. Adversary models for confidentiality

Session 4

AEAD modes of operation. Protecting channels with symmetric cryptography.
TLS Record. IPsec ESP

Session 5

First test.
Practice session: TLS Record; theoretical and practical attacks

Session 2

Stream ciphers (with examples, incl. A5). Block ciphers (with examples, incl. DES, AES) and modes of operations (incl. ECB, CBC, OFB, CFB, CTR)

Session 3

Integrity and authenticity. Adversary models and basic concepts. Hash functions (incl. SHA-2 and SHA-3) and MACs. Randomness
and pseudorandomness. 
HMAC. PRFs, KDFs

Session 6

Public key encryption (RSA, ElGamal encryption system). FFC and ECC.
Key exchange protocols (DH(E), ECDH(E)). CMS encryption mechanisms based on EC