Number of hours
- Lectures 16.5
- Projects -
- Tutorials 6.0
- Internship -
- Laboratory works 15.0
ECTS
ECTS 0.0
Goal(s)
After the course, the student should be able to:
- analyze the security needs of a communication and/or computation system at an algorithmic/informational level;
- find trivial flaws in (in)secure protocol proposals;
- grasp the design principles and security stakes of cryptographic primitives;
- implement a cryptographic primitive (hardware or embedded) knowing its specification.
Yann KIEFFER
Content(s)
- The need for cryptographic primitives and protocols;
- Symmetric cryptosystems: design, make-up, analysis;
- Security features of protocols;
- Security assessment of cryptographic protocols;
- Arithmetic for asymmetric cryptography;
- Examples of asymmetric cryptosystems;
- Implementations of cryptographic primitives.
Hardware design courses: digital design, VHDL, FPGA.
Embedded application design.
E1: result of end-term written exam (90 min)
E2: individual oral examination (30 min)
CC: semester-long assessment
Documents and calculators authorized for all exams
The exam is given in english only
The course exists in the following branches:
- Curriculum - EIS - Semester 9 (this course is given in english only )
- Curriculum - EIS (Apprenticeship) - Semester 9 (this course is given in english only )
- Curriculum - - Semester 9 (this course is given in english only )
Course ID : 5AMSE520
Course language(s):
The course is attached to the following structures:
You can find this course among all other courses.
The code book: the science of secrecy from ancient Egypt to quantum cryptography, Simon Singh; Anchor.
Cryptography - a very short introduction, Fred Piper & Sean Murphy; Oxford university press.
Understanding cryptography - a textbook for students and practitioners, Christoph Paar, Jan Pelzl; Springer.