The course is also offered to the students of the fields other than those the course is directly associated with.
Fields of study the course is directly associated with
there are 38 fields of study the course is directly associated with, display
At the end of the course students should be able to:
understand intermediate-level issues of deploying cryptographic mechanisms;
apply a crypto or security standard to fit the solution sought;
judge pros and cons of crypto methods considered for deployment;
independently design and test simple cryptographic solutions;
evaluate common crypto protocols in terms of security and efficiency.
This course explores the issues of applied cryptography issues,
and topics cover:
Relations of symmetric and asymmetric cryptography.
Hash functions and their applications.
Digital signatures, MAC.
Cryptographic protocols, entity authentication.
Public key infrastructure, certification.
Trust, electronic and/vs. real relations.
E-commerce security, payment systems.
Hardware protection of (cryptographic) secrets.
Patents and standards.
Application of cryptography in selected systems - wireless sensor networks, smartcards, privacy enhancing technologies.
MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997. xiii, 780. ISBN 0-8493-8523-7. info
SCHNEIER, Bruce. Applied cryptography, second edition : protocols, algorithms, and source code in C. New York: John Wiley & Sons, 1996. xxiii, 758. ISBN 0471117099. info
lecture, assignments (home work) of applied nature
Final "open book" exam accounts for 50% and assignments also for 50%
of the final grade. Both the course and the final exam are in English.