Cryptographic Protocols (B-KUL-H0Q28A)

4 ECTSEnglish30 First term
Delpech de Saint Guilhem Cyprien (coordinator) |  N. |  Singelée Dave (substitute) |  Delpech de Saint Guilhem Cyprien (substitute)
POC Cybersecurity

This course will cover cryptographic protocols, how they are defined and modelled. The course will cover the construction of these protocols and how they are used but will not focus on provable security aspects. The protocols selected will be wide ranging, from generic protocols through to application specific ones. The topics will include the following, and others, as time and the interest of the students dictate. The course will build upon the high-level view of protocols considered in the Cryptography and Network Security course, and examine the desired (and obtained) goals in greater detail.

Students should have taken the course Cryptography and Network Security (B-KUL-H05E1A)           

Mixed prerequisite:
You may only take this course if you comply with the prerequisites. Prerequisites can be strict or flexible, or can imply simultaneity. A degree level can be also be a prerequisite.
Explanation:
STRICT: You may only take this course if you have passed or applied tolerance for the courses for which this condition is set.
FLEXIBLE: You may only take this course if you have previously taken the courses for which this condition is set.
SIMULTANEOUS: You may only take this course if you also take the courses for which this condition is set (or have taken them previously).
DEGREE: You may only take this course if you have obtained this degree level.


SIMULTANEOUS( H05E1A )

The codes of the course units mentioned above correspond to the following course descriptions:
H05E1A : Cryptography and Network Security

Activities

4 ects. Cryptographic Protocols: Lecture (B-KUL-H0Q28a)

4 ECTSEnglishFormat: Lecture30 First term
N. |  Singelée Dave (substitute) |  Delpech de Saint Guilhem Cyprien (substitute)
POC Cybersecurity

This course will cover cryptographic protocols, how they are defined and modelled. The course will cover the construction of these protocols and how they are used but will not focus on provable security aspects. The protocols selected will be wide ranging, from generic protocols through to application specific ones. The topics will include the following, and others, as time and the interest of the students dictate. The course will build upon the high-level view of protocols considered in the Cryptography and Network Security course and examine the desired (and obtained) goals in greater detail.

  • Key agreement. What are the various attacks and the associated solutions?
  • Basic Network Protocols: TLS, IPSec, SSH, Signal, 4G, Bluetooth. WIFI
  • Payment/Banking Protocols: EMV, Bitcoin, Blockchain
  • Advanced Crypto Protocols: MPC. What can it achieve in theory? Constructions based on two-party garbled circuits and multi-party linear secret sharing schemes.
  • Other widely used application specific protocols: DRM, Hard disk encryption, database encryption

Course material will be provided on Toledo

Evaluation

Evaluation: Cryptographic Protocols (B-KUL-H2Q28a)

Type : Exam during the examination period
Description of evaluation : Written
Type of questions : Open questions
Learning material : Calculator


The exam during the examination period is an oral exam with written preparation. It is an open book exam; additional texts may be consulted.

The exam consists of exercises and/or strength-weakness analysis and/or comparison of the cryptosystems explained in the course

If, for reasons of force majeure, the faculty decides that an oral defence cannot be combined with a written preparation, then the oral defence will be waived.