582462 Advanced Course on Computer Security (ohtk 25.8.2011)

Principal themes Prerequisite knowledge Approaches the learning objectives Reaches the learning objectives Deepens the learning objectives
Modular arithmetics

Elementary mathematical proof technique.

Can compute addition, multiplication and inverses in modular arithmetics. Can construct pritmitive roots and finite fields. Can write the Extended Euclid Algorithm and simulate it.
Key agreement protocols Representation of algorithms in pseudo language. Is able to enumerate the principles for design of cryptographic and public key protocols. Can analyse and find holes in key agreement protocols presented in the course. Can present and analyse the key agreement protocols presented in the course.
Group key agreement (changing part in the course)   Can simulate and analyse Burmester-Desmedt protocol versions.  Can simulate and analyse tree-based protocols.   Can present and analyse the group key agreement protocols presented in the course.
 Introduction to HIP.    Can analyse the security and trust aspects of the Base Exchange Protocol. Can analyse the security and trust aspects of the Lightweight HIP.   
28.08.2011 - 19:13 Jyrki Kivinen
21.03.2011 - 16:58 Timo Karvi