TU Delft
Year
NEDERLANDSENGLISH
Organization
Education Type
Education print this page print this page     
2008/2009 Electrical Engineering, Mathematics and Computer Science Master Electrical Engineering
ET4271
Cryptography
ECTS: 4
Responsible Instructor
Name E-mail
Dr.ir. J.C.A. van der Lubbe    J.C.A.vanderLubbe@tudelft.nl
Instructor
Name E-mail
Ir. K. Cartrysse    K.Cartrysse@tudelft.nl
Contact Hours / Week x/x/x/x
0/0/2/0
Education Period
3
Start Education
3
Exam Period
3
4
Course Language
English
Course Contents
In the course attention will be paid to cryptographic Algorithms and mechanisms for security and privacy protection in information services and products. In the course the following issues will be considered:
Confidentially: Information storage, transmission, processing and user interfaces should be secured in such a way that confidentiality is guaranteed and that only authorised parties can understand and trust the information content. A distinction will be made between symmetric and asymmetric systems (secret key and public key systems, respectively). Since in each systems there is at least one secret key specific measures are needed for the secure storage of secret keys. This is one of the aims of Key Management schemes.
Data integrity: The information received and transmitted should be reliable. For a malicious party it should be impossible to change the transmitted information. Also for the user it should be impossible to alter the stored information. Here Hash function can be used among others.
Authenticity: Measures are needed such that the parties involved can check their mutual authenticity in order to avoid that someone else can use your identity. Zeroknowledge techniques are a possibility. But also the authenticity of the data can be of importance, e.g. for copyright-protection.
Digital signatures: If both message integrity and source authentication are required digital signatures are the answer. Public key systems can be used, but also Message Authentication Codes (MACís).
Non-repudiation: In practice most methods for authenticity and data integrity are based on mutual trust of the participating parties. If the identity of a party is checked the underlying assumption is that that party is in good faith and has not given its identity characteristics to another party. Non-repudiation is necessary when performed actions should be proven in view of third parties.Privacy: Many applications not only ask for security measure but also for methods safeguarding privacy of users. The area which deals with privacy protection is Privacy Enhancing Technologies (PET).
Applications: In addition to the algorithms and mechanisms itself attention will also paid to applications where security and privacy plays a role: e-commerce, e-cash, e-government, intelligent agent technology.
Study Goals
<>
Education Method
Lectures
Literature and Study Materials
Basic Methods of Cryptography, Cambridge University Press, 1998 or later. Or: Basismethoden Crypografie, DUM, 2e druk, 1997.
Assessment
Written examination solely
Remarks
Office hours by agreement.