Budapest University of Technology and Economics, Faculty of Electrical Engineering and Informatics

    címtáras azonosítással

    vissza a tantárgylistához   nyomtatható verzió    

    Applied Cryptography

    A tantárgy neve magyarul / Name of the subject in Hungarian: Alkalmazott kriptográfia

    Last updated: 2014. november 17.

    Budapest University of Technology and Economics
    Faculty of Electrical Engineering and Informatics
    Course ID Semester Assessment Credit Tantárgyfélév
    VIHIA030   3/1/0/v 4  
    3. Course coordinator and department Dr. Buttyán Levente,
    4. Instructors
    Dr. Levente Buttyán
     Associate Professor
    Dr. István Zsolt Berta
    István Lám
    5. Required knowledge No special prerequisites are needed.
    6. Pre-requisites
    NEM (Training.Code=("5N-A7")
    VAGY Training.Code=("5N-M7")
    VAGY Training.Code=("5N-A8")
    VAGY Training.Code=("5N-M8")
    VAGY Training.Code=("5N-MEU")
    VAGY Training.Code=("5N-MGAIN")
    VAGY Training.Code=("5N-37")
    VAGY Training.Code=("5N-38")
    VAGY Training.Code=("5NAA7")
    VAGY Training.Code=("5NAM7")
    VAGY Training.Code=("5NAA8")
    VAGY Training.Code=("5NAM8")
    VAGY Training.Code=("5NA37")
    VAGY Training.Code=("5NA38") )

    A fenti forma a Neptun sajátja, ezen technikai okokból nem változtattunk.

    A kötelező előtanulmányi rendek grafikus formában itt láthatók.

    7. Objectives, learning outcomes and obtained knowledge The objective of the course is to give an introduction to the basics of cryptography, to explain how basic building blocks work, and to demonstrate how secure systems can be engineered by properly using them. Besides the theoretical background, we use lot of illustrative examples and show practical applications. In addition, besides the technical details, we give an outlook to the legal and business aspects of using cryptography.
    8. Synopsis Week 1: Motivation and basic concepts. Examples for cyber attacks, attacker models, security objectives. History of Cryptography. Symmetric and asymmetric ciphers, digital signature schemes, cryptographic hash functions. Construction examples and parameter sizes.

    Exercise:  operation and properties of cryptographic building blocks.

    Week 2: Block encryption modes, MAC functions, PKCS formatting for public key algorithms.
    Week 3: Random number generation, attacks against PRNG-s, secure PRNG constructions. Key exchange protocols: attacker model and main design principles, illustrative examples (Needham-Schroeder, Wide Mouth Frog, Diffie-Hellman, ...). Manual and automated security verification of key exchange protocols.

    Exercise: usage of cryptographic libraries (eg. OpenSSL).

    Week 4: Introduction to Public Key Infrastructures (PKI): certificate, certification authority (CA), trust, key pair management, verification of digital signatures.

    Week 5: Digital vs. electronic signature: digital signature, authentication with public key cryptography; legal background of electronic signatures, related laws in the EU and in the US, qualified electronic signature; requirements for electronic signatures, the process of creating and verifying electronic signatures, certificate revocation, electronic signature archive formats.

    Exercise: establishment of a certification authority.

    Week 6: PKI and secure communications on the web. Security of and trust in CAs. Audit frameworks. Practical examples for security issues in CAs. Business models for PKI.

    Week 7: Secure communcation protocols: TLS/SSL (operation and analysis).

    Exercise: attacks of communication and key exchange protocols.

    Week 8: Security in wireless networks: WiFi security protocols  (WEP, WPA, WPA2) (operation and analysis).

    Week 9: Other topics: cryptography in resource constrained environments (embedded systems, RFID systems). Privacy protection with cryptographic solutions: anonim communication systems and private authentication protocols.

    Exercise: measuring privacy in anonymous communication systems.

    Week 10: Password based authentication: cryptographic protection of passwords in applications, and password based key derivation. Two factor authentication, one-time passwords. Authentication and authorization in practice (Kerberos, OAuth, OpenID, SAML).

    Week 11: Applications: Disk encryption and secure electronic mail (PGP and SMIME).

    Exercise: use of PGP and SMIME in practice.

    Week 12: Client side encryption in the Tresorit cloud based data storage system.

    Week 13: DRM and secure file sharing in the Tresorit system.

    Exercise: Tresorit setup for a virtual business environment

    Week 14: Summary and outlook to other application areas of cryptography.

    9. Method of instruction Lecture and classroom exercise.
    10. Assessment In the semester:
    3 homework sucessfully delivered. Homeworks are given on the 5th, 8th, and 11th week.
    Homeworks are due on the 8th, 11th and last week of the semester.

    In the exam period:
    Oral exam.

    11. Recaps In case of late delivery of homeworks, the official faculty rules apply.
    12. Consultations In an on-demand manner, date/time agreed on with the lecturers.
    13. References, textbooks and resources William Stallings, Cryptography and Network Security – Principles and Practices, 4th Edition, Prentice Hall, 2006.

    On-line lecture slides.

    14. Required learning hours and assignment
    Number of contact hours56
    Preparation to the classes 
    Preparation to the tests 
    Assigned reading 
    Preparation to the exam34
    15. Syllabus prepared by
    Dr. Levente Buttyán
     Associate Professor
    Dr. István Zsolt Berta
    István Lám