Selected topics on Cryptography and Computer Security

The course will cover selected topics from the following list:

 Symmetric cryptography
- classical Ciphers and History of Cryptography
- Kerckho Principle and various attacks on cryptosystems
- Shannon Theory of Information (Perfect, Computational and Provable Security)
- Block Ciphers (DES/IDEA, AES and nalists, Linear and Di erential Analysis)
- Stream Ciphers/PRNG (LFSR and Berlekamp-Massey algorithm, RC4,...),
- Cryptoanalysis and Statistical Methods
- Hash Functions (MD/SHA, HMAC, ...),
- Authentication Codes (MAC),
- Birthday Paradox Attacks, new attacks,...

 Public-key cryptography (Asymmetric Cryptography)
- Perfect Security (Computational, Unconditional and Provable Security)
- Public-Key Cryptosystems, One-Way Functions and related problems in Number Theory
- Primality Testing, Integer Factorization, Discrete Logarithem Problem)
- Digital Signatures (RSA, DSA, one-time, blind, group etc.)
- Key Agreement Protocols (Die-Hellman, ElGamal, Kerberos, STS)
- Identi cation Schemes for humans and devices (challenge/response, ...)
- Other protocols (head/tail over the phone, mental poker, Secret Sharing Schemes, Au-
thentication Schemes, Timestamps, Visual Cryptography, Zero-Knowledge Proofs)
- Quantum cryptography

Computer and information security
- Security of programs (bugs, viruses, malicious code)
- Security of databases (anonymization, homomorphic encryption)
- Security of OS (MS Win, Unix/Linux, liveCD)
- Security of network communication ( rewalls, VPN, IPSec, SSL)

A detailed description of the course content, divided into weekly lectures (15W, 45h)
Week 1 Introduction
Week 2-5 (A) Funamentals of Cryptography (Project proposal)
Week 6-11 (B) Advanced topics in Cryptography and Computer Security
(Milestone presentations)
Week 12 (C) Applied Projects
Week 13-15 (D) Research topics (Project Presentation)