Accès direct au contenu
Direct Access to menu
The course presents the theoretical and practical models and tools used to assess and to caracterise the security of a cryptosystem, a protocol or an effective information system.
The course is divided in three parts:
Basic knowledge (master-1st year level) in probabilities, algorithms and complexity, operating systems; arithmetic and basic cryptography protocols.
Cf webpage of the course;
 The handbook of applied cryptography", by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone; online: http://www.cacr.math.uwaterloo.ca/hac/index.html
 The Foundations of Cryptography (vol 1 and 2) by Oded Goldreich. http://www.wisdom.weizmann.ac.il/~oded/foc.html
 'Security Engineering, 2nd ed', Ross Anderson - http://www.cl.cam.ac.uk/~rja14/book.html
E1 - final examination: 1 written exam (3h);
TP: practical work: 1;
CC: continuous controls: 2 written controls (30' each). The mark obtained to the continuous control is taken into account only if larger than the mark of the final examination.
(under decision of the jury): E2: 1 final examination in session2: oral (30') if <=5 students; written (1h) if >= 6 students.