TU Delft
Education Type
Education print this page print this page     
2007/2008 Electrical Engineering, Mathematics and Computer Science Master Electrical Engineering
Responsible Instructor
Name E-mail
Dr.ir. J.C.A. van der Lubbe    J.C.A.vanderLubbe@tudelft.nl
Name E-mail
Ir. K. Cartrysse    K.Cartrysse@tudelft.nl
Contact Hours / Week x/x/x/x
Education Period
Exam Period
Course Language
Course Contents
In the course attention will be paid to cryptographic Algorithms and mechanisms for security and privacy protection in information services and products. In the course the following issues will be considered:
Confidentially: Information storage, transmission, processing and user interfaces should be secured in such a way that confidentiality is guaranteed and that only authorised parties can understand and trust the information content. A distinction will be made between symmetric and asymmetric systems (secret key and public key systems, respectively). Since in each systems there is at least one secret key specific measures are needed for the secure storage of secret keys. This is one of the aims of Key Management schemes.
Data integrity: The information received and transmitted should be reliable. For a malicious party it should be impossible to change the transmitted information. Also for the user it should be impossible to alter the stored information. Here Hash function can be used among others.
Authenticity: Measures are needed such that the parties involved can check their mutual authenticity in order to avoid that someone else can use your identity. Zeroknowledge techniques are a possibility. But also the authenticity of the data can be of importance, e.g. for copyright-protection.
Digital signatures: If both message integrity and source authentication are required digital signatures are the answer. Public key systems can be used, but also Message Authentication Codes (MACís).
Non-repudiation: In practice most methods for authenticity and data integrity are based on mutual trust of the participating parties. If the identity of a party is checked the underlying assumption is that that party is in good faith and has not given its identity characteristics to another party. Non-repudiation is necessary when performed actions should be proven in view of third parties.Privacy: Many applications not only ask for security measure but also for methods safeguarding privacy of users. The area which deals with privacy protection is Privacy Enhancing Technologies (PET).
Applications: In addition to the algorithms and mechanisms itself attention will also paid to applications where security and privacy plays a role: e-commerce, e-cash, e-government, intelligent agent technology.
Education Method
Literature and Study Materials
Basic Methods of Cryptography, Cambridge University Press, 1998 or later. Or: Basismethoden Crypografie, DUM, 2e druk, 1997.
Written examination solely
Office hours by agreement.