SubjectsSubjects(version: 806)
Course, academic year 2017/2018
   Login via CAS
Cryptanalytic Attacks - NMMB404
Czech title: Kryptoanalytické útoky
Guaranteed by: Department of Algebra (32-KA)
Faculty: Faculty of Mathematics and Physics
Actual: from 2016
Semester: summer
E-Credits: 6
Hours per week, examination: summer s.:3/1 C+Ex [hours/week]
Capacity: unlimited
Min. number of students: unlimited
State of the course: taught
Language: English
Teaching methods: full-time
Guarantor: Dr. rer. nat. Faruk Göloglu
Class: M Mgr. MMIB
M Mgr. MMIB > Povinné
Classification: Mathematics > Algebra
Incompatibility : NMIB011
Interchangeability : NMIB011
Annotation -
Last update: T_KA (14.05.2013)

Attacks against classic cryptosystems and chosen modern symmetric and asymmetric ciphers are treated in this course. Practical methods of searching for a weaknesses in given cryptosystem and exploitation of such weaknesses are emphasized.
Literature - Czech
Last update: T_KA (14.05.2013)

Advances in Cryptology, Springer-Verlag, svazky LNCS 1403, 1440, 1592, jde o sborníky z konferencí EUROCRYPT.

Syllabus -
Last update: T_KA (14.05.2013)

1-3. Elementary building blocks: hash functions, encrypting/decrypting transformations, signing/verifying transformations. Brute force attacks, existence and searching for attacks which would be more feasible than the brute force ones. Properties of the elementary cryptographic transformations, weak keys, intentional generating of weak keys, individual bits theorems.

4. Random number generators. Cryptanalytic attacks on pseudorandom generators, possible defects of physical generators. Prediction and influencing of sequences being generated.

5. Main results of side-channels theory. Data processing of timing, power and electromagnetic measurements.

6. Symmetric encryption schemes. Attacks on stream and block ciphers. Classification of attacks, gaming description, attacks involved by properties of particular encryption modes of operation. 7. Asymmetric encryption schemes. Classification of attacks, gaming description. Encoding of messages being encrypted.

8. Special schemes for key distribution and key agreement. Passive and active attacks.

9. Message authentication (integrity) schemes. Attacks on a CBC based MAC. Cryptanalytic properties of HMAC construction.

10. Signature schemes. Classification of attacks, gaming description. Signature forgery.

11. Non-repudiation of digital signatures. Formal description of an alternative explanation strategy. Message and key collisions.

12. Higher level protocols attacks. How a combination of several cryptographic techniques influences a cryptanalytic resistance. Encrypt-then-Authenticate and Authenticate-then-Encrypt constructions, consequences.

13. Reserved

Charles University | Information system of Charles University |