650.050 (21S) Advanced Topics in Cybersecurity 1

Sommersemester 2021

Anmeldefrist abgelaufen.

Erster Termin der LV
02.03.2021 14:00 - 16:00 online Off Campus
... keine weiteren Termine bekannt

Überblick

Bedingt durch die COVID-19-Pandemie können kurzfristige Änderungen bei Lehrveranstaltungen und Prüfungen (z.B. Absage von Präsenz-Lehreveranstaltungen und Umstellung auf Online-Prüfungen) erforderlich sein.

Weitere Informationen zum Lehrbetrieb vor Ort finden Sie unter: https://www.aau.at/corona.
Lehrende/r
LV-Titel englisch
Advanced Topics in Cybersecurity 1
LV-Art
Vorlesung-Kurs (prüfungsimmanente LV )
LV-Modell
Onlinelehrveranstaltung
Semesterstunde/n
4.0
ECTS-Anrechnungspunkte
6.0
Anmeldungen
8 (30 max.)
Organisationseinheit
Unterrichtssprache
Englisch
LV-Beginn
02.03.2021
eLearning
zum Moodle-Kurs

Zeit und Ort

Beachten Sie bitte, dass sich aufgrund von COVID-19-Maßnahmen die derzeit angezeigten Termine noch ändern können.
Liste der Termine wird geladen...

LV-Beschreibung

Intendierte Lernergebnisse

This course will help you to develop the following skills 

  • Understand the design of modern cryptographic primitives (including the atomic operations used to design them) and implement them. 
  • Identify the weak components of cryptographic functions. 
  • Develop cryptanalytic attacks (at least using the techniques taught in this course) and implement such attacks.
  • Comprehend and verify the threat of a cryptanalytic attack to a system. 

Lehrmethodik inkl. Einsatz von eLearning-Tools

All the lectures of this course will be either online or pre-recorded. All learning materials including lecture-room link or pre-recorded lecture will be made available via moodle page of the course. 

Inhalt/e

Introduction: What is cryptanalysis ? A glimpse of historical cryptanalysis of old/electro-mechanical encryptions, What does modern cryptanalysis look like?

Mathematical background

  • A crash course on group, ring and field 
  • Introduction to finite fields of the form GF(2^n), Polynomial arithmetic 

Block cipher and Cryptanalysis

  • The Advanced Encryption Standard (AES), The data encryption standard (DES)
  • Block cipher, Security of block cipher: Adversarial model (key-recovery, predictability and distinguishability)
  • Brute force cryptanalysis, Revisiting meet-in-the-middle attack on multiple encryption

Cryptanalysis of block cipher - 1

  • Introduction to differential cryptanalysis and linear cryptanalysis
  • Differential cryptanalysis of toy cipher and implementation of the cryptanalytic attack
  • Differential cryptanalysis of DES, Implementation of the attack on DES
  • Slide attack on iterative block cipher

Cryptanalysis of block cipher - 2

  • Lightweight (LW) block ciphers, Examples of LW ciphers
  • Description of  a lightweight block cipher (Klein)
  • Cryptanalytic attack on the cipher (Klein), Implementation of the attack

[Additional topics]

  • Examples of authenticated encryption scheme
  • Cryptanalytic attack on the Kindle cipher

Stream cipher and Cryptanalysis

  • Stream Ciphers, The mathematics behind stream cipher design: LFSR, NLFSR
  • Correlation attack, Algebraic attack
  • Description of the stream cipher RC4
  • Cryptanalysis of RC4, Attack on WEP
  • Security of WEP, WPA and WPA2

[Additional topics]

  • The A5/1, E0 (bluetooth) ciphers
  • Cryptanalysis of E0 cipher

Cryptanalysis of Hash function - 1

  • Hash function, Description of MD5, SHA1, SHA2
  • Differntial cryptanalysis of hash function
  • Attack on a hash function MD5, Implementation of the attack.

Cryptanalysis of Hash function - 2

  • Time-memory trade-off attacks: Hellman table, Rainbow table
  • Password hashing, Dictionary attack and rainbow table attack on password protected systems

[Additional topics]

  • Examples of other cryptanalytic methods for hash function

Cryptanalysis of Public-key Cryptographic Function

  • Crash course on finte field over primes
  • Cryptanalysis of DL, baby step giant step, pollard rho
  • Cryptanalysis of RSA

[additional topics]

  • Introduction to elliptic curve (EC),  EC cryptography: EC DH, EC digital signature
  • security of ECC,  ECC for DRM


Erwartete Vorkenntnisse

To follow this course 

  • you must have attended the Introduction to Cybersecurity course , however this is not a strict requirement
  • you are expected to have the know of basic mathematics, probability theory and programming (C/Python), and a sense of logic and creativity.    

Prüfungsinformationen

Beurteilungsschema

Note Benotungsschema

Position im Curriculum

  • Masterstudium Angewandte Informatik (SKZ: 911, Version: 13W.1)
    • Fach: Information and System Security (Wahlfach)
      • Ausgewählte Kapitel der Systemsicherheit ( 2.0h VK / 4.0 ECTS)
        • 650.050 Advanced Topics in Cybersecurity 1 (4.0h VC / 6.0 ECTS)
  • Masterstudium Informatics (SKZ: 911, Version: 19W.1)
    • Fach: Information and System Security (Wahlfach)
      • Weitere LVen aus dem gewählten Spezialisierungsfach ( 0.0h XX / 12.0 ECTS)
        • 650.050 Advanced Topics in Cybersecurity 1 (4.0h VC / 6.0 ECTS)
          Absolvierung im 1. Semester empfohlen
  • Masterstudium Artificial Intelligence and Cybersecurity (SKZ: 993, Version: 20W.1)
    • Fach: Specialisation in Artificial Intelligence and Cybersecurity (Wahlfach)
      • 4.3 Advanced Topics in Cybersecurity 1 ( 0.0h VC / 6.0 ECTS)
        • 650.050 Advanced Topics in Cybersecurity 1 (4.0h VC / 6.0 ECTS)
          Absolvierung im 2., 3. Semester empfohlen

Gleichwertige Lehrveranstaltungen im Sinne der Prüfungsantrittszählung

Diese Lehrveranstaltung ist keiner Kette zugeordnet