Cryptography

Course Information
TitleΚρυπτογραφία / Cryptography
CodeCNSS106
FacultySciences
SchoolInformatics
Cycle / Level2nd / Postgraduate
Teaching PeriodWinter
CoordinatorKonstantinos Draziotis
CommonNo
StatusActive
Course ID600016162

Programme of Study: PMS DIKTYA EPIKOINŌNIŌN KAI ASFALEIA SYSTĪMATŌN (2018 éōs sīmera) PF

Registered students: 9
OrientationAttendance TypeSemesterYearECTS
Asfáleia SystīmátōnCompulsory Course belonging to the selected specialization (Compulsory Specialization Course)117.5

Class Information
Academic Year2024 – 2025
Class PeriodWinter
Faculty Instructors
Weekly Hours3
Class ID
600263273
Course Type 2011-2015
Specific Foundation / Core
Mode of Delivery
  • Face to face
Language of Instruction
  • Greek (Instruction, Examination)
Learning Outcomes
Cognitive: the cognitive goals of the course are the students to organize the fundamental knowledge of basic cryptography and to obtain new knowledge and get acquainted with new principles of cryptography which are utilized in computer security. Skills: students understand in depth basic notions of cryptography which are necessary in many procedures, implementations and applications used today.
General Competences
  • Apply knowledge in practice
  • Retrieve, analyse and synthesise data and information, with the use of necessary technologies
  • Adapt to new situations
  • Make decisions
  • Work in teams
  • Be critical and self-critical
  • Advance free, creative and causative thinking
Course Content (Syllabus)
Α. Introduction to cryptography Β. Symmetrical Cryptography Β1. One Time Pad Β2. Perfect Security-Stream ciphers Β3. DES Β4. AES B5. Hash functions Γ. Public Key cryptography Γ1. Diffie-Helmann Γ2. Mathmeatical Bckground Γ3. RSA Trapdoor Function, Rabin Trapdοor Function, Γ5. EL Gamal cryptosystem Γ6. RSA, ElGamal, DSA -- Digital signatures Γ7. Open PGP (presentation)
Keywords
Symmetric and Public Key Cryptography
Educational Material Types
  • Notes
  • Slide presentations
  • Book
Use of Information and Communication Technologies
Use of ICT
  • Use of ICT in Course Teaching
  • Use of ICT in Laboratory Teaching
  • Use of ICT in Communication with Students
  • Use of ICT in Student Assessment
Course Organization
ActivitiesWorkloadECTSIndividualTeamworkErasmus
Lectures39
Reading Assigment35
Project125
Written assigments23
Exams3
Total225
Student Assessment
Description
The course has two projects and also the students prepare and present to the audience a topic of their choice. The assessment is as follows: 50% for the two assignments, 10% for the presentation, and 40% for the final written exam.
Student Assessment methods
  • Written Assignment (Formative, Summative)
  • Performance / Staging (Formative, Summative)
  • Written Exam with Problem Solving (Formative, Summative)
Bibliography
Course Bibliography (Eudoxus)
Εισαγωγή στην Κρυπτογραφία Κωδικός Βιβλίου στον Εύδοξο: 112688871 Έκδοση: 1/2022 Συγγραφείς: Δραζιώτης Κωνσταντίνος ISBN: 978-618-85820-5-7 Τύπος: Ηλεκτρονικό Βιβλίο
Additional bibliography for study
1. Cryptography an introduction, N.Smart (3rd edition) (online: https://www.cs.umd.edu/~waa/414-F11/IntroToCrypto.pdf) 2. Handbook of Applied Cryptography, Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone (on line : http://cacr.uwaterloo.ca/hac/) 3. Cryptography. An Introduction (Student Mathematical Library , AMS), V.V. Yaschenko
Last Update
24-02-2025