### Instruction

Name | Cr | Method of study | Time | Location | Organiser |
---|---|---|---|---|---|

Cryptography in Networking | 5 Cr | General Examination | 2.5.2019 - 2.5.2019 |

Name | Cr | Method of study | Time | Location | Organiser |
---|---|---|---|---|---|

Cryptography in Networking | 5 Cr | General Examination | 24.1.2019 - 24.1.2019 | ||

Cryptography in Networking (U) | 5 Cr | General Examination | 28.11.2018 - 28.11.2018 | ||

Cryptography in Networking | 5 Cr | Examination | 22.10.2018 - 22.10.2018 | ||

Cryptography in Networking | 5 Cr | Lecture Course | 4.9.2018 - 18.10.2018 | ||

Cryptography in Networking | 5 Cr | General Examination | 15.8.2018 - 15.8.2018 | ||

Cryptography in Networking | 5 Cr | General Examination | 25.4.2018 - 25.4.2018 | ||

Cryptography in Networking | 5 Cr | General Examination | 24.1.2018 - 24.1.2018 | ||

Cryptography in Networking (U) | 5 Cr | General Examination | 24.11.2017 - 24.11.2017 | ||

Cryptography in Networking | 5 Cr | Lecture Course | 5.9.2017 - 19.10.2017 |

### Target group

Master's Programme in Computer Science is responsible for the course.

The course belongs to Security module.

The course is available to students from other degree programmes.

### Prerequisites

Basic university mathematics course.

Basic university-level course in networking.

### Learning outcomes

The student learns most important cryptographic concepts and relevant mechanisms that are used in realizing those concepts. Examples of these concepts are symmetric ciphers, public-key encryption, digital signatures, message authentication codes and has functions. Student also learns basic mathematical tools that are used as building blocks in cryptographic mechanisms. The student becomes able to apply mathematics for the purposes of cryptography. More advanced cryptographic primitives are also learnt at least on conceptual level. Such primitives include protocols for e.g. zero-knowledge proofs, secret sharing and multipart computations. The student learns how to apply cryptographic tools for information security and privacy, especially in the domain of networking. Mobile communication and block chains are examples of application areas that the student becomes familar with.

### Timing

First year of Master's studies

Every year, Autumn period I

### Contents

Basics of cryptography

Mathematical tools

Symmetric ciphers:

AES, differential and linear cryptanalysis, block cipher modes, random number generators, stream ciphers, cryptanalysis against stream ciphers

Public-key encryption:

RSA, side channel attacks, quantum computer attacks

Digital signatures:

Hash functions, certificates, PKI

Systems based on discrete logarithms:

Diffie-Hellman key exchange, Man-in-the-middle attacks, One-time pad, ElGamal, Elliptic Curve Cryptography

Cryptographic protocols:

Key establishment, attacks, design principles

Special protocols:

Secret sharing, Bitcoin, Zero-knowledge proofs, Oblivious transfer, Secure multiparty computation, Authenticated encryption

Communication security:

TLS, IPSec

Cryptography for mobile security:

GSM, 3G, LTE, 5G, WiFi, Bluetooth

### Activities and teaching methods in support of learning

Student attends lectures, solves exercise problems and presents solutions.

Lecture slides are collected to the wiki page.

### Study materials

Lecture slides are distributed in the wiki page of the course.

### Assessment practices and criteria

Exam includes 4-5 problems each of equal weight. Completion of exercises provides bonus points worth 0-20 % of exam points.

### Recommended optional studies

Cyber Security

### Completion methods

Contact teaching.

Student has to complete 25% of the exercise problems to qualify to the exam.

Exam in the end of the course.

Completion of good portion of exercise problems provides bonus points in the exam. Completion of 25% provides 0 bonus points while completion of 90% provides bonus points worth of 20% of points available in the exam.