2WC13 - Cryptography 2 - Part 2 - Cryptographic Systems - 2014
For Part 1 - Cryptographic Protocols - by Berry Schoenmakers - there is a
separate webpage.
Teachers
Andreas Hülsing, MF 6.146, e-mail
a.t.huelsing@tue.nl
GPG-key:
152BFF2E
Fingerprint: BF9B D534 C876 99CA B62D 0E94 E2DE 5372 152B FF2E
alternative (different primary user ID):
GPG-key:
01B35919
Fingerprint: 99BC B8A1 BC54 7B3E 1752 DF32 CD28 F101 01B3 5919
Ruben Niederhagen, MF 6.102, e-mail
r.niederhagen@tue.nl
GPG-key:
7BB8F395
Fingerprint: 6E96 2752 E51E 47DC 5D1F D578 2420 10CA 7BB8 F395
Meilof Veeningen, MF 6.104A, e-mail
m.veeningen@tue.nl
GPG-key:
1C291B4B
Fingerprint: 7EE5 E859 CABF 0443 368C 5C13 C003 8673 1C29 1B4B
Schedule
Dates and time (by default): Monday 13:45 - 15:30 (telelecture)
Location: Aud 14
Purpose
To get a basic understanding of some of the main cryptographic systems that are in use today.
A cryptographic system is that part of an information system that provides
cryptographic security services. Usually it consists of a collection of protocols
and mechanisms such as encryption, key agreement, authentication, key management,
to achieve security goals such as message protection, transaction security, or
access control.
Topics
- Multi-Party Computation.
- PKI, Certificates.
- SSL, TLS; Tor network.
Exam
You have to write two papers, one in mid-term and one in the exam period.
You will be asked to study some literature or a standard document, and
report on that in written form. The first one will be on PKI, the second
one on one of the other topics. In both cases there will be a list of
topics from which you can choose.
The first paper has weight 1/3, the second one has weight 2/3.
All papers must be submitted encrypted and signed by email.
Assignments
- First assignment.
Deadlines: |
Choice of topic: | before May 22nd, 23:59. |
Assignment of topic: | May 23rd. |
Submission of paper: | before June 9th, 23:59. |
- Second assignment.
Deadlines: |
Choice of topic: | before June 19th, 23:59. |
Assignment of topic: | June 20th. |
Submission of paper: | before July 13th, 23:59. |
Lectures
Each week a note will be posted here on what has been treated, as well as the slides.
Monday April 28 - lecture 1: 16:30 in the Blauwe Zaal
16:30 Ruben Niederhagen:
Dual EC – a standardized back door
17:00 Jacob Applebaum:
Guest lecture
Monday May 12 - lecture 2
Meilof Veeningen:
An introduction to the general setting of multi-party computation (MPC)
and its applications; and a discussion of the protocols and system
design of the VIFF framework for programming MPC applications.
Monday May 19 - lecture 3
Andreas Hülsing: PKI.
Monday May 26 - lecture 4
Andreas Hülsing: PKI Infrastructure, X.509.
Monday June 2 - lecture 5
Ruben Niederhagen: Network layer security, transport layer security.
Monday June 16 - lecture 6
Ruben Niederhagen: Anonymity in the Internet.
Resources
These are
resources collected by Benne de Weger for the lecture in previous years.
Latest modification: July 15, 2014