Ensimag Rubrique Formation 2022

Symmetric and asymmetric cryptology; PKI architecture - WMM53T2

  • Number of hours

    • Lectures 36.0
    • Tutorials 21.0
    • Laboratory works 3.0


    ECTS 6.0


Contact Jean-Guillaume DUMAS



Stream and block ciphers : Basic Algebra
Public key methods : knowledge of arithmetic over the intergers and modular arithmetics. Knowledge on finite fuelds.
Undergraduate linear algebraand commutative algebra. Basic knowledge on probability and statistics. Basic knowledge on complexity
theory and programming languageSome familiarity with at least one computational algebra system.
PKI : Secret key Cryptography, Public Key Cryptography, e-Signature, Hash functions


The exam is given in english only 

Continuous Examination :
Stream and block ciphers 2 practical works
Public key methods : 1 computer classroom evaluation and 1 classroom evaluation
PKI 1 assignment and 1 practical exam.
1 final exam in 3 parts.

S1=20%TP+15%CC+65%E1; S2=20%TP+15%CC+65%E2(if E2>E1)

Additional Information

This course is given in english only EN

Curriculum->M2 Sec, Crypt. and Coding of Info.->SCCI - Semester 3


  • Bruce Schneier : Applied Cryptography
  • A.J. Menezes, P.C. van Oorshot, S.A. Vanstone : Handbook of Applied cryptography, CRC Press 1997
  • D. Stinson : Cryptography, theory et pratique, .Int. Thomson Pub France 1996. et 2nd éd 2003.
  • S. Vaudenay A classical Introduction to Cryptography , Applications for COmmunications Security, Springer 2006
  • Mao, W; Modern Cryptography: Theory and Practice, 2003
  • Hankerson, D; Menezes, A; Vanstone, S; Guide to Elliptic Curve Cryptography 2004
  • Koblitz, N; Algebraic Aspects of Cryptography 2004
  • Yan, S; Primality Testing and Integer Factorization in Public-Key Cryptography, 2003
  • Yan, S; Cryptanalytic Attacks on RSA , 2007
  • Carlisle Adams and Steve Lloyd. Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley Professional; 2nd
    edition 2002.
  • C. Cachat et D. Carella. PKI Open source : déploiement et administration. O'Reilly 2003.
  • Cryptographie et sécurité des systèmes et réseaux, T. Ebrahimi, F. Leprevost, and B. Warusfeld, éditeurs, Hermès 2006.
  • J-G. Dumas, J-L. Roch, É. Tannier et S. Varrette. Théorie des codes : compression, cryptage, correction. Dunod 2007.
  • B. Schneier. Secrets et Mensonges : sécurité numérique en réseau. Vuibert Informatique 2001.