
LB – Protocols 2 – Advanced Protocols, Privacy LA – Protocols 1 – Authentication, Key Exchange L8 – Asymmetric Primitives 2 – Discrete Log, ECC L7 – Asymmetric Primitives 1 – Factoring, RSA We will cover the necessary mathematical and methodical background so that you can try your own hands in the exercises at breaking ciphers to gain a deeper understanding of their design. Authentication and key-exchange protocols, including an introduction to advanced privacy-preserving protocolsįor all these building blocks, we will have a look at the design ideas and goals behind the algorithm, its security properties in practice, and some cryptanalysis techniques such as differential cryptanalysis.Asymmetric encryption and digital signatures (RSA, DH, DSA, ECC, post-quantum crypto, …).Authenticated Encryption, hashing, and symmetric primitives (AES-GCM, SHA-3, …).This lecture covers the most important building blocks modern cryptographic protocols and their security, including:

Cryptography is the mathematical backbone of information security.
