|Name||Cr||Method of study||Time||Location||Organiser|
|Cryptography in Networking (U)||5 Cr||General Examination||27.11.2019 - 27.11.2019|
|Cryptography in Networking||5 Cr||Course exam||21.10.2019 - 21.10.2019|
|Cryptography in Networking||5 Cr||Lecture Course||3.9.2019 - 18.10.2019|
|Cryptography in Networking||5 Cr||General Examination||14.8.2019 - 14.8.2019|
|Cryptography in Networking||5 Cr||General Examination||2.5.2019 - 2.5.2019|
|Cryptography in Networking||5 Cr||General Examination||24.1.2019 - 24.1.2019|
|Cryptography in Networking (U)||5 Cr||General Examination||28.11.2018 - 28.11.2018|
|Cryptography in Networking||5 Cr||Examination||22.10.2018 - 22.10.2018|
|Cryptography in Networking||5 Cr||Lecture Course||4.9.2018 - 18.10.2018|
|Cryptography in Networking||5 Cr||General Examination||15.8.2018 - 15.8.2018|
|Cryptography in Networking||5 Cr||General Examination||25.4.2018 - 25.4.2018|
|Cryptography in Networking||5 Cr||General Examination||24.1.2018 - 24.1.2018|
|Cryptography in Networking (U)||5 Cr||General Examination||24.11.2017 - 24.11.2017|
|Cryptography in Networking||5 Cr||Lecture Course||5.9.2017 - 19.10.2017|
Master's Programme in Computer Science is responsible for the course.
The course belongs to Security module.
The course is available to students from other degree programmes.
Basic university mathematics course.
Basic university-level course in networking.
The student learns most important cryptographic concepts and relevant mechanisms that are used in realizing those concepts. Examples of these concepts are symmetric ciphers, public-key encryption, digital signatures, message authentication codes and has functions. Student also learns basic mathematical tools that are used as building blocks in cryptographic mechanisms. The student becomes able to apply mathematics for the purposes of cryptography. More advanced cryptographic primitives are also learnt at least on conceptual level. Such primitives include protocols for e.g. zero-knowledge proofs, secret sharing and multipart computations. The student learns how to apply cryptographic tools for information security and privacy, especially in the domain of networking. Mobile communication and block chains are examples of application areas that the student becomes familar with.
First year of Master's studies
Every year, Autumn period I
Basics of cryptography
AES, differential and linear cryptanalysis, block cipher modes, random number generators, stream ciphers, cryptanalysis against stream ciphers
RSA, side channel attacks, quantum computer attacks
Hash functions, certificates, PKI
Systems based on discrete logarithms:
Diffie-Hellman key exchange, Man-in-the-middle attacks, One-time pad, ElGamal, Elliptic Curve Cryptography
Key establishment, attacks, design principles
Secret sharing, Bitcoin, Zero-knowledge proofs, Oblivious transfer, Secure multiparty computation, Authenticated encryption
Cryptography for mobile security:
GSM, 3G, LTE, 5G, WiFi, Bluetooth
Activities and teaching methods in support of learning
Student attends lectures, solves exercise problems and presents solutions.
Lecture slides are collected to the wiki page.
Lecture slides are distributed in the wiki page of the course.
Assessment practices and criteria
Exam includes 4-5 problems each of equal weight. Completion of exercises provides bonus points worth 0-20 % of exam points.
Recommended optional studies
Student has to complete 25% of the exercise problems to qualify to the exam.
Exam in the end of the course.
Completion of good portion of exercise problems provides bonus points in the exam. Completion of 25% provides 0 bonus points while completion of 90% provides bonus points worth of 20% of points available in the exam.