|
|||||
View general information Description The subject within the syllabus as a whole Professional fields to which it applies Prior knowledge Information prior to enrolment Learning objectives and results Content View the UOC learning resources used in the subject Additional information on support tools and learning resources Guidelines on assessment at the UOC View the assessment model | |||||
This is the course plan for the first semester of the academic year 2024/2025. To check whether the course is being run this semester, go to the Virtual Campus section More UOC / The University / Programmes of study section on Campus. Once teaching starts, you'll be able to find it in the classroom. The course plan may be subject to change. | |||||
This subject pretends to give a global vision of criptology and its applications. In the first part a historical perspective will be introduced and the foundations of criptoanalysis and of the main shared and secret key systems will be given. Secondly, we will present some cryptographic protocols like the ones of authentication and identification, secret sharing schemes, secret, the use of electronic money or electronic voting. |
|||||
This subject is optional subject of the second semester. |
|||||
Software engineering, electronic devices, and cloud storing systems. |
|||||
Basic knowledge of mathematics (Mathematics Bachelor's degree or engineering). Capacity to read scientific texts in English. |
|||||
|
|||||
Knowing the prolematics of security. Knowing the classic cryptographic systems of the history of cryptography. Having basic notions of information theory. Knowing how to analyze the authenticity and the secret of basic cryptosystems. Knowing the most standard shared key encryptions, flow ciphers and block ciphers. Knowing and know how to manipulate the most standard public key encryption systems. Having some basic ideas of digital signature. Knowing some cryptographic protocols such as authentication and identification, secret sharing schemes, mutual mistrust management, electronic money management and electronic voting. |
|||||
1) Introduction to cryptology: Terminology. Historical evolution. Applications of cryptology. 2) Fundamentals of cryptology: Historical cryptosystems. Fundamentals of information theory. Perfect secrecy and perfect authenticity. Elementary cryptanalysis. 3) Shared key cryptosystems, flow ciphers: Flow cipher sequence requirements. Linear generators. Nonlinear generators. 4) Shared key cryptosystems, block ciphers: Block cipher structure. Block crypto. Attacks on block ciphers. Key management. 5) Public Key Encryption: Preliminary Concepts. Fundamentals of public key cryptosystems. Diffie-Hellman key exchange. Public Key Cryptosystems. 6) Digital signatures: Digital signature. Digital signature schemes. Hash Functions. 7) Cryptographic protocols: Authentication and identification. Secret sharing schemes. Situations of mutual mistrust. Electronic money. Electronic voting. |
|||||
|
|||||
Notes, books, specialized webs and scientific articles. |
|||||
The assessment process is based on students' own work and the assumption that this work is original and has been carried out by them. In assessment activities, the following irregular behaviours, among others, may have serious academic and disciplinary consequences: someone else being involved in carrying out the student's assessment test or activity, or the work being not entirely original; copying another's work or committing plagiarism; attempting to cheat to obtain better academic results; collaborating in, covering up or encouraging copying; or using unauthorized material, software or devices during assessment. If students are caught engaging in any of these irregular behaviours, they may receive a fail mark (D/0) for the assessable activities set out in the course plan (including the final tests) or in the final mark for the course. This could be because they have used unauthorized materials, software or devices (e.g. social networking sites or internet search engines) during the tests, because they have copied text fragments from an external source (internet, notes, books, articles, other student's projects or activities, etc.) without correctly citing the source, or because they have engaged in any other irregular conduct. In accordance with the UOC's academic regulations , irregular conduct during assessment, besides leading to a failing mark for the course, may be grounds for disciplinary proceedings and, where appropriate, the corresponding punishment, as established in the UOC's coexistence regulations. In its assessment process, the UOC reserves the right to:
|
|||||
|