252-0408-00L  Cryptographic Protocols

SemesterSpring Semester 2024
LecturersM. Hirt
Periodicityyearly recurring course
Language of instructionEnglish



Courses

NumberTitleHoursLecturers
252-0408-00 VCryptographic Protocols2 hrs
Thu09:15-11:00ML E 12 »
M. Hirt
252-0408-00 UCryptographic Protocols2 hrs
Thu11:15-13:00ML E 12 »
M. Hirt
252-0408-00 ACryptographic Protocols1 hrsM. Hirt

Catalogue data

AbstractIn a cryptographic protocol, a set of parties wants to achieve some common goal, while some of the parties are dishonest. Most prominent example of a cryptographic protocol is multi-party computation, where the parties compute an arbitrary (but fixed) function of their inputs, while maintaining the secrecy of the inputs and the correctness of the outputs even if some of the parties try to cheat.
ObjectiveTo know and understand a selection of cryptographic protocols and to
be able to analyze and prove their security and efficiency.
ContentThe selection of considered protocols varies. Currently, we consider
multi-party computation, secret-sharing, broadcast and Byzantine
agreement. We look at both the synchronous and the asynchronous
communication model, and focus on simple protocols as well as on
highly-efficient protocols.
Lecture notesWe provide handouts of the slides. For some of the topics, we also
provide papers and/or lecture notes.
Prerequisites / NoticeA basic understanding of fundamental cryptographic concepts (as taught
for example in the course Information Security) is useful, but not
required.
CompetenciesCompetencies
Subject-specific CompetenciesConcepts and Theoriesassessed
Techniques and Technologiesassessed
Method-specific CompetenciesAnalytical Competenciesassessed
Decision-makingfostered
Personal CompetenciesCreative Thinkingfostered
Critical Thinkingfostered

Performance assessment

Performance assessment information (valid until the course unit is held again)
Performance assessment as a semester course
ECTS credits6 credits
ExaminersM. Hirt
Typesession examination
Language of examinationEnglish
RepetitionThe performance assessment is only offered in the session after the course unit. Repetition only possible after re-enrolling.
Mode of examinationoral 20 minutes
This information can be updated until the beginning of the semester; information on the examination timetable is binding.

Learning materials

 
Main linkInformation
Only public learning materials are listed.

Groups

No information on groups available.

Restrictions

There are no additional restrictions for the registration.

Offered in

ProgrammeSectionType
Cyber Security MasterElective CoursesWInformation
Cyber Security MasterElectivesWInformation
DAS in Cyber SecurityElective CoursesWInformation
Electrical Engineering and Information Technology MasterSpecialization CoursesWInformation
Electrical Engineering and Information Technology MasterRecommended SubjectsWInformation
Computer Science TCSpecialized Courses in Respective Subject with Educational FocusWInformation
Computer Science Teaching DiplomaSpec. Courses in Resp. Subj. w/ Educ. Focus & Further Subj. DidacticsWInformation
Computer Science MasterElective CoursesWInformation
Computer Science MasterElective CoursesWInformation
Computer Science MasterMinor in Information SecurityWInformation
Computer Science MasterMinor in Theoretical Computer ScienceWInformation
Mathematics BachelorSelection: Theoretical Computer ScienceWInformation
Mathematics MasterSelection: Theoretical Computer Science, Discrete MathematicsWInformation