Course Identification

Applied Cryptography
20194222

Lecturers and Teaching Assistants

Prof. Adi Shamir, Dr. Eyal Ronen
N/A

Course Schedule and Location

2019
Second Semester
Monday, 11:15 - 13:00, Ziskind, Rm 1
25/03/2019

Field of Study, Course Type and Credit Points

Mathematics and Computer Science: Lecture; Elective; 2.00 points

Comments

N/A

Prerequisites

No

Restrictions

50

Language of Instruction

English

Attendance and participation

Expected and Recommended

Grade Type

Numerical (out of 100)

Grade Breakdown (in %)

10%
40%
50%

Evaluation Type

Examination

Scheduled date 1

12/07/2019
Ziskind, Rm 1
1000-1200
N/A

Scheduled date 2

02/09/2019
Ziskind, Rm 1
1100-1300
N/A

Estimated Weekly Independent Workload (in hours)

3

Syllabus

Cryptography is the art and science of protecting secret information. In this course I will describe the main types of secret key cryptosystems and hash functions which had been proposed so far, and study their security against various types of cryptanalytic attacks. I will then describe the latest developments in side-channel attacks, which exploit physical leakages (running time, power consumption, electromagnetic radiation,etc) from the implementations of these mathematical schemes to efficiently break even the most secure cryptosystems. Finally, if time permits I will describe how such cryptographic schemes are used in practice in various internet protocols, and how cyber attacks manage to overcome these defenses.

Learning Outcomes

Upon successful completion of this course students will be able to:

  1. Demonstrate in depth knowledge of the main cryptosystems and protocols used to protect information
  2. Demonstrate knowledge of how researchers are trying to break the main cryptosystems and protocols that are used to protect information.
  3. Impleme the main cryptosystems and protocols that are used to protect information in new applications. 
  4. Understand how cyber attacks can (sometimes) overcome cyber defenses.

Reading List

N/A

Website

N/A