Cryptologic Protocol Theory
FEKT-TCPTCompulsoryBachelor's (1st cycle)Acad. year: 2015/2016Summer semester3. year of study4 credits
The course contains the introduction into advanced cryptography and provides the students with the information about basic cryptographic primitives and schemes. In particular, the commitment schemes, interactive proof systems, zero-knowledge protocols, sigma protocols, interactive and non-interactive proof of knowledge protocols, group signatures and advanced systems like eCash and attribute-based credentials are covered.
Learning outcomes of the course unit
Students will obtain theoretical knowledge of main primitives used in modern cryptography, in particular of commitment schemes, zero-knowledge protocols, sigma-protocols and advanced schemes built using these primitives. After course completion, students will be able to:
Explain in English the principles of cryptographic commitments, zero-knowledge protocols and sigma protocols.
Design the interactive proof of knowledge protocols.
Use the commitment schemes in complex cryptosystems.
Evaluate speed and computational efficiency of standard proof of knowledge protocols.
Explain in English the principles of attribute authentication systems and eCash systems.
Mode of delivery
90 % face-to-face, 10 % distance learning
Basic knowledge of cryptography as provided in the compulsory subject Foundations of Cryptography, in particular of the asymmetric cryptosystems, is required to enroll the course. Furthermore, the basic knowledge of Czech terminology in cryptography and B1 intermediate English level is required.
Recommended optional programme components
Recommended or required reading
OCHODKOVÁ, Eliška. Matematické základy kryptografických algoritmů [online]. [cit. 2013-06-11]. Dostupné z: http://mi21.vsb.cz/sites/mi21.vsb.cz/files/unit/mat_zaklady_kryptografickych_algoritmu.pdf (CS)
MENEZES, Alfred J. Handbook of applied cryptography. Vyd. 1. Boca Raton: CRC Press, 1997, 780 s. ISBN 08-493-8523-7. Online http://cacr.uwaterloo.ca/hac/. (EN)
STALLINGS, William. Cryptography and network security: principles and practice. Seventh edition. xix, 731 pages. ISBN 01-333-5469-5. (EN)
GARRETT, Paul. Making, breaking codes: an introduction to cryptology. Vyd. 1. Upper Saddle River: Prentice Hall, 2001, xix, 523 s. ISBN 01-303-0369-0. (EN)
DAMGAARD, I.; NIELSEN, J. B. Commitment Schemes and Zero-Knowledge Protocols [online]. Dostupné z: https://services.brics.dk/java/courseadmin/CPT/documents. (EN)
DAMGAARD, I. On Σ-protocols [online]. Dostupné z: https://services.brics.dk/java/courseadmin/CPT/documents. (EN)
Planned learning activities and teaching methods
Methods of educations are described in the article 7 of the BUT’s Study and Examination Regulation. Teachning methods include lectures and laboratories. Course is taking advantage of e-learning (Moodle) system.
Assesment methods and criteria linked to learning outcomes
The maximum of 15 points is given upon completion of the theoretical test in laboratories. The correct completion of all tasks in laboratories adds 15 points. The requirements on the completion of the tasks in laboratories are described in the annual supervisor’s notice. The maximum of 70 points can be gained during the final exam.
Language of instruction
1. Introduction to modern cryptography
2. Terminology overview
3. Basic cryptographic primitives overview
4. Commitment schemes
5. Use of cryptographic commitment schemes in protocol construction
6. Interactive proof systems
7. Zero-knowledge protocols
8. Sigma protocols
9. Sigma protocols II
10. Interactive and non-interactive proofs of knowledge
11. Integration of primitives into advanced systems
12. Group signatures
13. Attribute-based credentials
The goal of the course is to extend the introductory cryptology courses and to provide students with deeper knowledge of advanced principles of modern cryptology and English terminology. Students will learn the principles of selected building blocks of modern cryptographic protocols and schemes and will be able to understand English information sources during their further studies.
Specification of controlled education, way of implementation and compensation for absences
The conditions for the successful course completion are stated in the yearly updated supervisor’s notice.