TU Delft
Education Type
Education print this page print this page     
2016/2017 Electrical Engineering, Mathematics and Computer Science Master Computer Science
Security and Cryptography
Responsible Instructor
Name E-mail
Dr.ir. J.C.A. van der Lubbe    J.C.A.vanderLubbe@tudelft.nl
Name E-mail
Z. Erkin    Z.Erkin@tudelft.nl
Contact Hours / Week x/x/x/x
Education Period
Start Education
Exam Period
Course Language
Required for
Privacy Enhancing Technologies (Q4)
Expected prior knowledge
Basic understanding on the following is needed.
-Probability and statistics
-Discret Mathematics or Modular Arithmetic
-Programming skills
Course Contents
Computers are now found in every layer of society, and information is being communicated and processed automatically on a large scale. Examples include medical and financial files, automatic banking, video-phones, pay-tv, teleshopping and global computer networks. In all these cases there is a growing need for the protection of information to safeguard economic interests, to prevent fraud and to ensure privacy.

Security and cryptography are essential components of any digital system. In this course, the fundamentals of secure data storage and transportation of information are described. In particular, classical (e.g. Caesar, Vigenere) and modern encryption schemes (RSA, DES, AES, Elliptic curves) are described along with their mathematical background such as number theory. Methods for authentication, data integrity and digital signatures are discussed in detail, as these are the main components of many security architectures. The course also investigates more advanced topics such as zero-knowledge proofs and secret sharing schemes.

It is the aim that at the end of the course one has a survey of the state of the art of both cryptographic algorithms and protocols for security and privacy, as well as is familiar with present applications.

Learning outcomes:
The goal is to make students familiar with the basic concepts applied cryptography, including classical cryptography and modern secret key and public key cryptography. In particular, the students will acquire
• A sound understanding of the notion of security
• An understanding of the confidentiality, integrity and authenticity needs of the society
• Understand the role of cryptographic primitives including the differences between symmetric and asymmetric cryptography, the role of hash functions, digital signatures and PKI
• Understand the advanced topics in cryptography needed for the modern society with untrustworthy entities
• Understand quantum cryptography as a new technological breakthrough

Among others things, the following topics are covered:
-Classical systems
-Information theoretic security
-Symmetric encryption (e.g. DES, AES)
-Asymmetric encryption (RSA, Elliptic Curves)
-Hash functions
-Random number generation
-Digital Signatures, Zero Knowledge Proofs and Commitment schemes
-Key Management
-Secret Sharing.
Study Goals
It is the aim that at the end of the course one has a survey of the state of the art of both cryptographic algorithms and protocols for security, as well as is familiar with present applications.

Through assignments, students are expected to have practical experience on the topics covered.
Education Method
Lectures, assignments and exercises.

Planned Workload:
Lectures: 28 x 45minutes sessions, total 22 hours
Assignments: 3 x 15 hour, total 45 hours
Reading study material: 14x 2 hours, total 28 hours
Exam preparation: 20 hours
Exam: 3 hours
Literature and Study Materials
Basic Methods of Cryptography, J.C.A. van der Lubbe, VSSD, Delft or Idem, Cambridge University Press.

Handouts of lectures
written exam(80%) + assignments (20%)
Exam Hours
The exam is closed book.
Permitted Materials during Tests
Only simple calculators.