introduction to course
play

Introduction to Course Helger Lipmaa Institute of Computer Science - PowerPoint PPT Presentation

MTAT.07.005 Cryptographic Protocols Introduction to Course Helger Lipmaa Institute of Computer Science University of Tartu http://www.cs.ut.ee/lipmaa T-79.159 Cryptography and Data Security, 14.02.2005 Introduction to Course, Helger Lipmaa


  1. MTAT.07.005 Cryptographic Protocols Introduction to Course Helger Lipmaa Institute of Computer Science University of Tartu http://www.cs.ut.ee/˜lipmaa T-79.159 Cryptography and Data Security, 14.02.2005 Introduction to Course, Helger Lipmaa 1

  2. Cryptographic Protocols / 2006 • Lecturer: Helger Lipmaa • Reception: by appointment • Lectures • Course material: Slides • Newsgroup: opinnot.tik.salaus T-79.159 Cryptography and Data Security, 14.02.2005 Introduction to Course, Helger Lipmaa 2

  3. Comparison with T-79.159/2004 • Slides from 2004 (my course at HUT) are on the web • I will reuse some slides, but not many T-79.159 Cryptography and Data Security, 14.02.2005 Introduction to Course, Helger Lipmaa 3

  4. Goals • Cryptographic protocols: basic ideas, intuition, and design examples • To explain which tasks and how can be performed securely and which tasks can be not • To understand what it means for something to be secure • To give a basic overview of existing protocols • Hopefully: To develop basic cryptographic thinking T-79.159 Cryptography and Data Security, 14.02.2005 Introduction to Course, Helger Lipmaa 4

  5. Prerequisities • Mathematics: one or two years of basic studies. Discrete mathematics is essential! • Understanding of computer architectures • Coding skills: some home assignments will need programming • A basic course in cryptography • Sophisticated and curious mind. Interest in solving puzzles, security issues T-79.159 Cryptography and Data Security, 14.02.2005 Introduction to Course, Helger Lipmaa 5

  6. Course Layout • Zero-Knowledge and related • Some basic protocols: identification, oblivious transfer • Secure two-party computation • Secure multi-party computation • Efficient protocols: e-voting, e-auctions, e-cash, privacy-preserving data mining, . . . T-79.159 Cryptography and Data Security, 14.02.2005 Introduction to Course, Helger Lipmaa 6

  7. Tentative Schedule ♯ Date Subject 1. 7.2 Cancelled (travelling) 2. 14.2 Introduction. Zero-knowledge 3. 21.2 Zero-knowledge 4. 28.2 Zero-knowledge + Identification + OT 5. 7.3 Cancelled (winter school) 6. 14.3 Two-party computation 7. 21.3 Two-party computation 8. 28.3 Multi-party computation 9. 4.4 Multi-party computation 10. 11.4 Homomorphic encryption 11. 18.4 Efficient protocols 11. 25.4 Efficient protocols 12. 2.5 Efficient protocols 13. 9.5 Efficient protocols 14. 16.5 Efficient protocols 15. 23.5 Efficient protocols. Epilogue 16. 30.5 Cancelled (travelling: Eurocrypt) T-79.159 Cryptography and Data Security, 14.02.2005 Introduction to Course, Helger Lipmaa 7

  8. Course Passing • ≈ 13 lectures (may be 1 or 2 more cancelled). • Two homeworks, both 30% of the grade. (End of March, end of May.) • Exam (40%) of the grade — time not fixed yet T-79.159 Cryptography and Data Security, 14.02.2005 Introduction to Course, Helger Lipmaa 8

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend