University of Warsaw - Central Authentication System
Strona główna

Cryptography 2

General data

Course ID: 1000-2M24KI2
Erasmus code / ISCED: (unknown) / (unknown)
Course title: Cryptography 2
Name in Polish: Kryptografia II
Organizational unit: Faculty of Mathematics, Informatics, and Mechanics
Course groups: Elective courses for Computer Science
ECTS credit allocation (and other scores): 6.00 Basic information on ECTS credits allocation principles:
  • the annual hourly workload of the student’s work required to achieve the expected learning outcomes for a given stage is 1500-1800h, corresponding to 60 ECTS;
  • the student’s weekly hourly workload is 45 h;
  • 1 ECTS point corresponds to 25-30 hours of student work needed to achieve the assumed learning outcomes;
  • weekly student workload necessary to achieve the assumed learning outcomes allows to obtain 1.5 ECTS;
  • work required to pass the course, which has been assigned 3 ECTS, constitutes 10% of the semester student load.

view allocation of credits
Language: (unknown)
Type of course:

elective monographs

Requirements:

Algorithms and data structures 1000-213bASD
Cryptography I 1000-2M12KI1
Discrete mathematics 1000-212bMD
Foundations of mathematics 1000-211bPM
Geometry with linear algebra 1000-211bGAL
Languages, automata and computations 1000-214bJAO
Mathematical analysis for computer science I 1000-211bAM1
Mathematical analysis for computer science II 1000-212bAM2
Probability theory and statistics 1000-213bRPS

Prerequisites:

Computability Theory 3800-KOG-MS1-TO
Information theory 1000-2N03TI
Security of computer systems 1000-215bBSK

Short description:

The course "Cryptography 2" is a follow-up to the course "Cryptography 1" taught in the winter semester. Passing it (or the course "Cryptography" taught by S. Dziembowski in earlier years) is required to attend this course. Compared to "Cryptography 1", this course is more theoretical and focuses on the latest developments in cryptography (often those that have not yet entered practical use) and formal proofs. The main criterion for the selection of topics taught is scientific curiosity. The subject will be mainly conducted using a blackboard (no slides).

Full description:

The content of the course will be dynamically adapted to the classes' progress. The preliminary plan is as follows (the order is subject to change):

1. Advanced definitions of security (including non-malleability)

2. Theoretical aspects of cryptography (Goldreich-Levin theorem, black-box separations, obfuscation, witness encryption)

3. Bilinear transformations and their applications in cryptography (Boneh-Franklin encryption, BLS signatures)

4. Algorithms of post-quantum cryptography

5. Consensus protocols and algorithms used in blockchain technology

6. Interactive and zero-knowledge proofs (including non-interactive proofs such as NIZK and zk-SNARK)

7. Multiparty computations and homomorphic encryption

8. Introduction to Universal Composability

9. Threshold schemes for encryption and signatures

10. Randomness extractors and their applications in leakage-resistant cryptography

Bibliography:

• Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography

• Dan Boneh and Victor Shoup A Graduate Course in Applied Cryptography

• Oded Goldreich Foundations of Cryptography: Volume 1

• Oded Goldreich Foundations of Cryptography: Volume 2

• Mike Rosulek The Joy of Cryptography

• research papers available freely online

Learning outcomes: (in Polish)

Zamierzone efekty kształcenia podzielone na trzy grupy: wiedza, umiejętności, kompetencje (lista efektów znajduje się w drugim załączniku)

Wiedza

1. Student ma uporządkowaną wiedzę na temat najnowszych osiągnięć współczesnej kryptografii. (P7S_WG).

2. Student zna podstawowe techniki kryptograficzne używane w naukowej kryptografii (P7S_WG).

Umiejętności

1. Student potrafi analizować bezpieczeństwo naukowych rozwiązań kryptograficznych (P7S_UW).

2. Student potrafi zrozumieć jakie problemy informatyczne mogą być w teorii rozwiązane za pomocą technik kryptograficznych (P7S_UW).

Kompetencje

1. Dogłębnie rozumie potrzebę dowodzenia bezpieczeństwa w kryptografii (P7S_KK).

2. Zna ograniczenia kryptografii teoretycznej: wie co jest możliwe, a co nie (P7S_KK).

3. Potrafi wstępnie ocenić wartość naukowych prac w kryptografii (P7S_KK).

Assessment methods and assessment criteria:

To pass the course, you must pass the exercises and the exam.

To pass the exercises, you must :

• deliver homework and

• pass the mid-term exam

The passing of the exercises is decided by the instructor.

The exam is conducted in written form.

Both the mid-term exam and the exam will consist of two parts:

1. testing knowledge (no materials such as notes and books will be allowed on it)

2. testing skills (without the above restriction)

The final grade for the course will be determined (on the first date) based on the weighted average of the mid-term exam (50%) and the exam results (50%).

Lecture and exercise instructors may decide to increase the grade for particularly active students.

Classes in period "Summer semester 2023/24" (in progress)

Time span: 2024-02-19 - 2024-06-16
Selected timetable range:
Navigate to timetable
Type of class:
Classes, 30 hours more information
Lecture, 30 hours more information
Coordinators: Stefan Dziembowski
Group instructors: Stefan Dziembowski, Paweł Kędzior, Marcin Mielniczuk
Students list: (inaccessible to you)
Examination: Examination

Classes in period "Summer semester 2024/25" (future)

Time span: 2025-02-17 - 2025-06-08
Selected timetable range:
Navigate to timetable
Type of class:
Classes, 30 hours more information
Lecture, 30 hours more information
Coordinators: Stefan Dziembowski
Group instructors: Stefan Dziembowski, Paweł Kędzior, Marcin Mielniczuk
Students list: (inaccessible to you)
Examination: Examination
Course descriptions are protected by copyright.
Copyright by University of Warsaw.
Krakowskie Przedmieście 26/28
00-927 Warszawa
tel: +48 22 55 20 000 https://uw.edu.pl/
contact accessibility statement USOSweb 7.0.3.0 (2024-03-22)