Offered: Fall 2025 (current)
Foundations of cryptographic protocols, identification and authentication, authorization, key exchange protocols, Public Key Infrastructure (PKI), transport layer security, network layer security, Email security, DNSSEC, Pretty Good Privacy (PGP), blockchain, secret sharing, Zero-knowledge proof, commitment schemes, TOR.
The core objectives of this course are to:
Acquire an overview and understanding of different cryptographic protocols
Develop of a clear understanding of some typical applications of cryptographic protocols
Acquire the ability to describe, analyze and construct cryptographic protocols to solve different security issues.
1. To Be Added
| # | Description | Weight | Edit |
|---|