Educational guide School of Engineering |
english |
Computer Security Engineering and Artificial Intelligence (2016) - Online |
Subjects |
CRYPTOGRAPHY AND INFORMATION SECURITY |
IDENTIFYING DATA | 2018_19 | |||||||||||||||||
Subject (*) | CRYPTOGRAPHY AND INFORMATION SECURITY | Code | 17685101 | |||||||||||||||
Study programme |
|
Cycle | 2nd | |||||||||||||||
Descriptors | Credits | Type | Year | Period | Exam timetables and dates | |||||||||||||
4.5 | Compulsory | First | 1Q |
|||||||||||||||
Modality and teaching language | See working groups | |||||||||||||||||
Prerequisites | ||||||||||||||||||
Department | Computer Engineering and Mathematics |
|||||||||||||||||
Coordinator |
|
|||||||||||||||||
Lecturers | |
|||||||||||||||||
Web | ||||||||||||||||||
General description and relevant information | The main goal of this course is to introduce the main cryptographic schemes, the main security notions, and to analyse the use of cryptography in the digital world. The first part of the course is dedicated to symmetric key cryptographic schemes, hash functions, and pseudorandom functions. Then we introduce the public-key cryptography paradigm, protocols for key exchange, public-key encryption schemes, and digital signatures. The last part of the course is dedicated to the security analysis of messaging applications and cloud services, blockchain technology, cryptocurrencies, post-quantum cryptography, and secure multiparty computation. | |||||||||||||||||
| ||||||||||||||||||
(*)The teaching guide is the document in which the URV publishes the information about all its courses. It is a public document and cannot be modified. Only in exceptional cases can it be revised by the competent agent or duly revised so that it is in line with current legislation. |