Foundations of Cryptography
1,5 credits, course, master's level, D7069E
Applying Cryptography without the knowledge of the underlying theory – and thereby the limitations of the cryptographic methods – is dangerous and has led to problems in the past.
A well-known example of this is, the KRACK Attack on WPA2, which is possible due to a misunderstanding of the theory behind NONCEs.Learning these details is a reason to take this course. The required foundations of math and complexity theory will be briefly refreshed as part of this course. However, this recap does not correspond to a math course covering these parts.
1,5 credits, course, master's level, D7069E
Applying Cryptography without the knowledge of the underlying theory – and thereby the limitations of the cryptographic methods – is dangerous and has led to problems in the past.
A well-known example of this is, the KRACK Attack on WPA2, which is possible due to a misunderstanding of the theory behind NONCEs.Learning these details is a reason to take this course. The required foundations of math and complexity theory will be briefly refreshed as part of this course. However, this recap does not correspond to a math course covering these parts.
Updated: