Unit CRYPTOGRAPHY AND APPLICATIONS

Course
Informatics
Study-unit Code
A002090
Curriculum
Cybersecurity
Teacher
Massimo Giulietti
CFU
12
Course Regulation
Coorte 2020
Offered
2021/22
Type of study-unit
Obbligatorio (Required)
Type of learning activities
Attività formativa integrata

CRYPTOGRAPHY AND APPLICATIONS: MOD. 1

Code A002091
CFU 6
Teacher Massimo Giulietti
Teachers
  • Massimo Giulietti
  • Daniele Bartoli (Codocenza)
Hours
  • 21 ore - Massimo Giulietti
  • 21 ore (Codocenza) - Daniele Bartoli
Learning activities Affine/integrativa
Area Attività formative affini o integrative
Academic discipline MAT/03
Type of study-unit Obbligatorio (Required)

CRYPTOGRAPHY AND APPLICATIONS: MOD. 2

Code A002092
CFU 6
Teacher Massimo Giulietti
Teachers
  • Massimo Giulietti
  • Marco Timpanella (Codocenza)
Hours
  • 21 ore - Massimo Giulietti
  • 21 ore (Codocenza) - Marco Timpanella
Learning activities Affine/integrativa
Area Attività formative affini o integrative
Academic discipline MAT/03
Type of study-unit Obbligatorio (Required)
Language of instruction English
Contents Classical Cryptography. Perfect Secrecy. Product Cryptosystems. DES and AES.
Linear and Differential Cryptanalysis. Introduction to Public-key Cryptography The RSA Cryptosystem. Factoring Algorithms.
The ElGamal Cryptosystem and Discrete Logs. Galois Fields.Elliptic Curves. Advanced Signature Schemes. Post quantum Crypto. Homomorphich Crypto.
Reference texts D.R. Stinson, Cryptography - Theory and Practice - Chapman & Hall/CRC

Mathematics of Public Key Cryptography. Version 2.0. S.D. Gailbraith, 2018
Educational objectives Obiettivi formativi OBIETT_FORM Sì Crittografia e applicazioni è l'insegnamento della Laurea Magistrale dedicato alle basi matematiche della sicurezza informatica.
L'obiettivo principale dell'insegnamento consiste nel fornire agli studenti le basi teoriche/matematiche per affrontare problemi concreti relativi alla sicurezza delle comunicazioni.
Le principali conoscenze acquisite saranno:
-Familiarità con l'aritmetica modulare e i campi finiti
-Familiarità con le basi di teoria algoritmica dei numeri.
-Dimestichezza con i concetti di crittosistema, crittografia a chiave pubblica, firma digitale, autenticazione, crittografia simmetrica.
Le principali abilità (ossia la capacità di applicare le conoscenze acquisite) saranno:
- valutare la sicurezza di un crittosistema simmetrico
- valutare la sicurezza di un crittosistema asimmetrico
- valutare la difficoltà computazionale di problemi di teoria dei numeri
- definire i parametri di un'infrastruttura di crittografia a chiave pubblica sicura Cryptography and applications is the course of the Master of Science devoted to the mathematical foundations of network security. The main goal of the course is to provide students with the theoretical / mathematical basis to address concrete problems related to the security of communications. The main knowledge gained will be: -Familiarity with modular arithmetic and finite fields -Familiarity with the basics of algorithmic theory of numbers. -Familiarity with the notions of cryptosystem, public key encryption, digital signature, authentication, symmetric encryption. The main skills will be: - Assessing the safety of a symmetric cryptosystem - Evaluating the safety of an asymmetric cryptosystem - Assessing the difficulty of computational problems in number theory - Defining the parameters of a safe infrastructure of public key cryptography
Prerequisites In order to understand and know how to apply most of the techniques described in the course, the student must have successfully passed the exams of Discrete Mathematics and Mathematical Analysis of the first degree
Teaching methods The course consists of classroom lectures on all topics of the course. In each lesson about half of the time will be devoted to solving problems and exercises
Learning verification modality The exam consists of an oral exam. Three questions relating to three separate parts of the program will be submitted to the student. The test lasts about 30-40 minutes and is designed to ensure the level of knowledge and ability of understanding reached by the student on the theoretical and methodological implications listed in the program (modular arithmetic and finite fields, public key encryption, symmetric encryption, hash and digital signature, The oral test will also allow to verify communication skills, appropriateness of language and autonomous organization of the exposure.
Extended program Classical Cryptography. The Shift Cipher. The Substitution Cipher. The Affine Cipher. The Vigenere Cipher
The Hill Cipher. The Permutation Cipher. Stream Ciphers.
Perfect Secrecy. Product Cryptosystems. Block ciphers: substitution-permutation networs. DES and AES.
Linear and Differential Cryptanalysis. Hash functions in cryptography. Iterated hash functions. Merkle-Damgard construction, SHA algorithms. Message authentication codes and universal hash families.
Introduction to Public-key Cryptography Elementary number theory: euclidean division, the chinese remainder theorem. The RSA Cryptosystem. Primality tests. Factoring Algorithms.
The ElGamal Cryptosystem and Discrete Logs. Algorithms for Discrete Logs. Galois Fields. Elliptic Curves. Signature Schemes. DSA and elliptic DSA. Edwards curves and EdDSA. Secret sharing. Post-quantum crypto. Homomorphic encryption.
Condividi su