Cryptography and Blockchain Technology Code:  M0.527    :  6
View general information   Description   The subject within the syllabus as a whole   Professional fields to which it applies   Prior knowledge   Information prior to enrolment   Learning objectives and results   Content   View the UOC learning resources used in the subject   Additional information on support tools and learning resources   Guidelines on assessment at the UOC   View the assessment model  
This is the course plan for the first semester of the academic year 2024/2025. To check whether the course is being run this semester, go to the Virtual Campus section More UOC / The University / Programmes of study section on Campus. Once teaching starts, you'll be able to find it in the classroom. The course plan may be subject to change.

This subject pretends to give a global vision of criptology and its applications. In the first part a historical perspective will be introduced and the foundations of criptoanalysis and of the main shared and secret key systems will be given. Secondly, we will present some cryptographic protocols like the ones of authentication and identification, secret sharing schemes, secret, the use of electronic money or electronic voting.

Amunt

This subject is optional subject of the second semester.

Amunt

Software engineering, electronic devices, and cloud storing systems.

Amunt

Basic knowledge of mathematics (Mathematics Bachelor's degree or engineering). Capacity to read scientific texts in English.

Amunt

  • Subject Coordinator: Dra. Maria Bras-Amorós (http://crises-deim.urv.cat/~mbras)
  • Credits: 5
  • Description: This subject pretends to give a global vision of criptology and its applications. In the first part a historical perspective will be introduced and the foundations of criptoanalysis and of the main shared and secret key systems will be given. Secondly, we will present some cryptographic protocols like the ones of authentication and identification, secret sharing schemes, the use of electronic money or electronic voting.
  • Bibliography: Notes, books and scientific articles

Amunt

Knowing the prolematics of security.

Knowing the classic cryptographic systems of the history of cryptography.

Having basic notions of information theory.

Knowing how to analyze the authenticity and the secret of basic cryptosystems.

Knowing the most standard shared key encryptions, flow ciphers and block ciphers.

Knowing and know how to manipulate the most standard public key encryption systems.

Having some basic ideas of digital signature.

Knowing some cryptographic protocols such as authentication and identification, secret sharing schemes, mutual mistrust management, electronic money management and electronic voting.

Amunt

1) Introduction to cryptology: Terminology. Historical evolution. Applications of cryptology.

2) Fundamentals of cryptology: Historical cryptosystems. Fundamentals of information theory. Perfect secrecy and perfect authenticity. Elementary cryptanalysis.

3) Shared key cryptosystems, flow ciphers: Flow cipher sequence requirements. Linear generators. Nonlinear generators.

4) Shared key cryptosystems, block ciphers: Block cipher structure. Block crypto. Attacks on block ciphers. Key management.

5) Public Key Encryption: Preliminary Concepts. Fundamentals of public key cryptosystems. Diffie-Hellman key exchange. Public Key Cryptosystems.

6) Digital signatures: Digital signature. Digital signature schemes. Hash Functions.

7) Cryptographic protocols: Authentication and identification. Secret sharing schemes. Situations of mutual mistrust. Electronic money. Electronic voting.

Amunt

Criptografía PDF

Amunt

Notes, books, specialized webs and scientific articles.

Amunt

The assessment process is based on students' own work and the assumption that this work is original and has been carried out by them.

In assessment activities, the following irregular behaviours, among others, may have serious academic and disciplinary consequences: someone else being involved in carrying out the student's assessment test or activity, or the work being not entirely original; copying another's work or committing plagiarism; attempting to cheat to obtain better academic results; collaborating in, covering up or encouraging copying; or using unauthorized material, software or devices during assessment.

If students are caught engaging in any of these irregular behaviours, they may receive a fail mark (D/0) for the assessable activities set out in the course plan (including the final tests) or in the final mark for the course. This could be because they have used unauthorized materials, software or devices (e.g. social networking sites or internet search engines) during the tests, because they have copied text fragments from an external source (internet, notes, books, articles, other student's projects or activities, etc.) without correctly citing the source, or because they have engaged in any other irregular conduct.

In accordance with the UOC's academic regulations , irregular conduct during assessment, besides leading to a failing mark for the course, may be grounds for disciplinary proceedings and, where appropriate, the corresponding punishment, as established in the UOC's coexistence regulations.

In its assessment process, the UOC reserves the right to:

  • Ask the student to provide proof of their identity, as established in the university's academic regulations.
  • Request that students provide evidence of the authorship of their work, throughout the assessment process, both in continuous and final assessment, by means of an oral test or by whatever other synchronous or asynchronous means the UOC specifies. These means will check students' knowledge and competencies to verify authorship of their work, and under no circumstances will they constitute a second assessment. If it is not possible to guarantee the student's authorship, they will receive a D grade in the case of continuous assessment or a Fail in the case of final assessment.

    For this purpose, the UOC may require that students use a microphone, webcam or other devices during the assessment process, in which case it will be the student's responsibility to check that such devices are working correctly.

Amunt

You can only pass the course if you participate in and pass the continuous assessment. Your final mark for the course will be the mark you received in the continuous assessment.

 

Amunt