Credits
6
Types
- GRAU: Elective
- GCED: Elective
Requirements
This subject has not requirements
, but it has got previous capacities
Department
MAT
The subject is suitable for students of all majors and is focused on 4th year students, with the minimum requirement having passed all the compulsory subjects or having passed 150 ECTS.
Teachers
Person in charge
- Fernando Martínez Sáez ( fernando.martinez@upc.edu )
Others
- Anna Rio Doval ( ana.rio@upc.edu )
- Jose Luis Ruiz Muñoz ( jose.luis.ruiz@upc.edu )
Weekly hours
Theory
2
Problems
0
Laboratory
2
Guided learning
0
Autonomous learning
6
Competences
Common technical competencies
- CT1.2A - To interpret, select and value concepts, theories, uses and technological developments related to computer science and its application derived from the needed fundamentals of mathematics, statistics and physics. Capacity to solve the mathematical problems presented in engineering. Talent to apply the knowledge about: algebra, differential and integral calculus and numeric methods; statistics and optimization.
- CT1.2C - To use properly theories, procedures and tools in the professional development of the informatics engineering in all its fields (specification, design, implementation, deployment and products evaluation) demonstrating the comprehension of the adopted compromises in the design decisions.
Information technology specialization
- CTI2.3 - To demonstrate comprehension, apply and manage the reliability and security of the computer systems (CEI C6).
- CTI3.1 - To conceive systems, applications and services based on network technologies, taking into account Internet, web, electronic commerce, multimedia, interactive services and ubiquitous computation.
Computer engineering specialization
- CEC4.2 - To demonstrate comprehension, to apply and manage the guarantee and security of computer systems.
Reasoning
- G9.1 - Critical, logical and mathematical reasoning capacity. Capacity to understand abstraction and use it properly.
Objectives
-
Distinguish between cryptosystems that can be safe and those that are snake oil.
Related competences: CTI3.1, G9.1, CT1.2A, CT1.2C, G3.1, CEC4.2, CTI2.3, -
Distinguish between public-key and secret-key cryptosystems
Related competences: CTI3.1, G9.1, CT1.2A, CT1.2C, G3.1, CEC4.2, CTI2.3, -
To understand the main ideas of secret-key cryptosystems.
Related competences: CTI3.1, G9.1, CT1.2A, CT1.2C, G3.1, CEC4.2, CTI2.3, -
To understand the main ideas of public-key cryptosystems
Related competences: CTI3.1, G9.1, CT1.2A, CT1.2C, G3.1, CEC4.2, CTI2.3,
Subcompetences- Integer factorization problem.
- Discrete logarithm problem in elliptic curves.
- Discrete logarithm problem in a finite field.
-
To understand the idea of digital signature and their role nowadays in internet.
Related competences: CTI3.1, G9.1, CT1.2A, CT1.2C, G3.1, CEC4.2, CTI2.3,
Contents
-
Basic concepts
Cryptology, Cryptography, and Cryptanalysis.
Classic cryptography and modern cryptography.
Basic techniques: encryption-decryption and signature.
Private key cryptography and public key cryptography.
The mathematical bases of cryptography. -
Modern secret key techniques
Block encryption, Stream ciphers.
Data Encryption Standard: Description, History, Standardisation, Cryptanalysis.
Advanced Encryption Standard: Description, Standardisation.
Operation modes for block-encrypted systems. -
Public key encryption
Multi-precision arithmetic operations. Euclidean algorithms.
Congruences, multiplication group, modular arithmetic, modular exponential, Chinese Remainder Theorem.
Calculation of square roots.
Prime numbers, probabilistic criteria of primeness, random generation of prime numbers.
Factorising integers, current state of the problem.
The discrete algorithm problem: variants over Finite Fields and elliptic curves.
RSA cryptosystem (Rivest, Shamir, Adleman).
ElGamal cryptosystem.
Diffie-Hellman key exchange. -
Digital signatures
Cryptographic hash functions. Secure Hash Standard.
Digital signatures: RSA, DSA and ECDSA
PKI: digital certificates X509, CRL and OCSP. -
Cryptographic protocols and standars
Encryption and decryption transformations. Mixed private key - public key techniques.
Identification schemes and protocols.
SSL.
Micro-payments.
Shared secrets.
Electronic voting.
Watermarks.
SMIME.
PKCS... -
New trens in Cryptography
Lattice-Based Public-Key Cryptography. Hyperelliptic curve cryptography. Quantum Cryptography
Activities
Activity Evaluation act
Theory
6h
Problems
0h
Laboratory
4h
Guided learning
0h
Autonomous learning
12h
Theory
12h
Problems
0h
Laboratory
8h
Guided learning
0h
Autonomous learning
30h
Theory
4h
Problems
0h
Laboratory
0h
Guided learning
0h
Autonomous learning
4h
Theory
3h
Problems
0h
Laboratory
0h
Guided learning
0h
Autonomous learning
16h
Theory
1h
Problems
0h
Laboratory
0h
Guided learning
0h
Autonomous learning
4h
Theory
0h
Problems
0h
Laboratory
1h
Guided learning
0h
Autonomous learning
2h
Theory
0h
Problems
0h
Laboratory
5h
Guided learning
0h
Autonomous learning
6h
Teaching methodology
Lectures in which the contents of the subject will be exposed. Lab classes where students solve real situations that can be found in practice.Evaluation methodology
There will be two tests in which the total content corresponding to Secret Key Cryptography has a weight of 20% of the final grade and the total content corresponding to Public Key Cryptography has a weight of 40% of the final grade. These two tests may be replaced by a final examination.The other 40% of the grade will correspond to the laboratory.
Bibliography
Basic
-
Understanding cryptography: a textbook for students and practitioners
- Paar, C.; Pelzl, J,
Springer,
2010.
ISBN: 9783642041006
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991003783079706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
An Introduction to mathematical cryptography
- Hoffstein, J.; Pipher, J. C.; Silverman, J. H,
Springer,
2014.
ISBN: 9781493917105
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991004118979706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
Handbook of applied cryptography
- Menezes, A.J.; Van Oorschot, P.C.; Vanstone, S.A,
CRC Press,
1997.
ISBN: 0849385237
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991001420389706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
Computer Security and the Internet : tools and jewels
- van Oorschot, Paul C,
Springer,
2020.
ISBN: 9783030336486
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991004874536106711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
RSA and public-key cryptography
- Mollin, R.A,
Chapman & Hall/CRC,
2003.
ISBN: 1584883383
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991002562489706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
Cryptography and network security: principles and practice
- Stallings, W,
Pearson,
2023.
ISBN: 9781292437484
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991005147378506711&context=L&vid=34CSUC_UPC:VU1&lang=ca
Complementary
-
Security engineering : a guide to building dependable distributed systems
- Anderson, R.J,
John Wiley & Sons, Inc.,
2020.
ISBN: 9781119642831
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991001802549706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
Cryptography: theory and practice
- Stinson, D.R.; Paterson, M.B,
Chapman & Hall/CRC,
2018.
ISBN: 9781138197015
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991004154859706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
Public-key cryptography
- Salomaa, A,
Springer-Verlag,
1996.
ISBN: 9783642082542
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991003734629706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
A course in number theory and cryptography
- Koblitz, N,
Springer-Verlag,
1994.
ISBN: 0387942939
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991001133579706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
Elliptic curves in cryptography
- Blake, I. F; Seroussi, G.; Smart, N,
Cambridge University Press,
1999.
ISBN: 0521653746
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991001892029706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
Introduction to cryptography: principles and applications
- Delfs, H.; Knebl, H,
Springer,
2007.
ISBN: 3540492437
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991003651819706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
Applied cryptography: protocols, algorithms, and source code in C
- Schneier, B,
John Wiley & Sons,
1996.
ISBN: 0471117099
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991001271399706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
Computational number theory and modern cryptography
- Yan, S.Y,
John Wiley & Sons,
2013.
ISBN: 9781118188613
https://ebookcentral-proquest-com.recursos.biblioteca.upc.edu/lib/upcatalunya-ebooks/detail.action?pq-origsite=primo&docID=1120602 -
The design of Rijndael: AES the advanced encryption standard
- Daemen, J.; Rijmen, V,
Springer,
2001.
ISBN: 3540425802
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991003286419706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
Guide to elliptic curve cryptography
- Hankerson, D.; Menezes, A.; Vanstone, S,
Springer,
2004.
ISBN: 038795273X
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991003110249706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
Criptografía digital : fundamentos y aplicaciones
- Pastor Franco, J.; Sarasa López, M.Á.; Salazar Riaño, J.L,
Prensas Universitarias de Zaragoza,
2001.
ISBN: 9788477335580
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991002419519706711&context=L&vid=34CSUC_UPC:VU1&lang=ca