Cryptography and Blockchain Technology Code:  M0.527    :  6
View general information   Description   The subject within the syllabus as a whole   Professional fields to which it applies   Prior knowledge   Information prior to enrolment   Learning objectives and results   Content   View the UOC learning resources used in the subject   Additional information on support tools and learning resources   Guidelines on assessment at the UOC   View the assessment model  
This is the course plan for the second semester of the academic year 2023/2024. To check whether the course is being run this semester, go to the Virtual Campus section More UOC / The University / Programmes of study section on Campus. Once teaching starts, you'll be able to find it in the classroom. The course plan may be subject to change.

This subject pretends to give a global vision of criptology and its applications. In the first part a historical perspective will be introduced and the foundations of criptoanalysis and of the main shared and secret key systems will be given. Secondly, we will present some cryptographic protocols like the ones of authentication and identification, secret sharing schemes, secret, the use of electronic money or electronic voting.

Amunt

This subject is optional subject of the second semester.

Amunt

Software engineering, electronic devices, and cloud storing systems.

Amunt

Basic knowledge of mathematics (Mathematics Bachelor's degree or engineering). Capacity to read scientific texts in English.

Amunt

  • Subject Coordinator: Dra. Maria Bras-Amorós (http://crises-deim.urv.cat/~mbras)
  • Credits: 5
  • Description: This subject pretends to give a global vision of criptology and its applications. In the first part a historical perspective will be introduced and the foundations of criptoanalysis and of the main shared and secret key systems will be given. Secondly, we will present some cryptographic protocols like the ones of authentication and identification, secret sharing schemes, the use of electronic money or electronic voting.
  • Bibliography: Notes, books and scientific articles

Amunt

Knowing the prolematics of security.

Knowing the classic cryptographic systems of the history of cryptography.

Having basic notions of information theory.

Knowing how to analyze the authenticity and the secret of basic cryptosystems.

Knowing the most standard shared key encryptions, flow ciphers and block ciphers.

Knowing and know how to manipulate the most standard public key encryption systems.

Having some basic ideas of digital signature.

Knowing some cryptographic protocols such as authentication and identification, secret sharing schemes, mutual mistrust management, electronic money management and electronic voting.

Amunt

1) Introduction to cryptology: Terminology. Historical evolution. Applications of cryptology.

2) Fundamentals of cryptology: Historical cryptosystems. Fundamentals of information theory. Perfect secrecy and perfect authenticity. Elementary cryptanalysis.

3) Shared key cryptosystems, flow ciphers: Flow cipher sequence requirements. Linear generators. Nonlinear generators.

4) Shared key cryptosystems, block ciphers: Block cipher structure. Block crypto. Attacks on block ciphers. Key management.

5) Public Key Encryption: Preliminary Concepts. Fundamentals of public key cryptosystems. Diffie-Hellman key exchange. Public Key Cryptosystems.

6) Digital signatures: Digital signature. Digital signature schemes. Hash Functions.

7) Cryptographic protocols: Authentication and identification. Secret sharing schemes. Situations of mutual mistrust. Electronic money. Electronic voting.

Amunt

Criptografía PDF

Amunt

Notes, books, specialized webs and scientific articles.

Amunt

The assessment process is based on the student's personal work and presupposes authenticity of authorship and originality of the exercises completed.

Lack of authenticity of authorship or originality of assessment tests, copying or plagiarism, the fraudulent attempt to obtain a better academic result, collusion to copy or concealing or abetting copying, use of unauthorized material or devices during assessment, inter alia, are offences that may lead to serious academic or other sanctions.

Firstly, you will fail the course (D/0) if you commit any of these offences when completing activities defined as assessable in the course plan, including the final tests. Offences considered to be misconduct include, among others, the use of unauthorized material or devices during the tests, such as social media or internet search engines, or the copying of text from external sources (internet, class notes, books, articles, other students' essays or tests, etc.) without including the corresponding reference.

And secondly, the UOC's academic regulations state that any misconduct during assessment, in addition to leading to the student failing the course, may also lead to disciplinary procedures and sanctions.

The UOC reserves the right to request that students identify themselves and/or provide evidence of the authorship of their work, throughout the assessment process, and by the means the UOC specifies (synchronous or asynchronous). For this purpose, the UOC may require students to use a microphone, webcam or other devices during the assessment process, and to make sure that they are working correctly.

The checking of students' knowledge to verify authorship of their work will under no circumstances constitute a second assessment.

Amunt

You can only pass the course if you participate in and pass the continuous assessment. Your final mark for the course will be the mark you received in the continuous assessment.

 

Amunt