Открытое образование

Cryptography (Основы теории информации и криптографии)

  • Начальный уровень
  • Наставник: Нет
  • Сертификат: Есть
  • Формат: Online
  • Рассрочка: Нет
  • Язык: Русский
  • Осталось мест: не ограничено
Записаться

Cryptography (Основы теории информации и криптографии)

Организатор курса: НГУ

The course invites you to learn more about cryptography; you'll learn some important math which stands behind the ciphers, and defines how resistant the particular cipher will be to different types of attacks.

Программа обучения
  • Module 1. The history of cryptorgaphy: an introduction
  • What is the course about?
  • The beginning of the Russian cryptography
  • Soviet and modern Russian cryptography
  • From cryptanalysis to cryptographic Boolean functions
  • Module 2. Cryptographic Boolean functions
  • Cryptographic Boolean functions: main properties
  • Boolean functions in cryptographic ciphers
  • Module 3. Bent functions
  • Introduction and history
  • Algebraic normal form of a bent function
  • Bent rectangles and simple constructions of bent functions
  • Automorphisms of the set of bent functions
  • Bent functions in small number of variables
  • Module 4. Bent functions: generalizations and applications
  • Bent sum decomposition problem
  • Generalizations of bent functions
  • Cryptographic generalizations
  • Module 5. Almost Perfect Nonlinear functions
  • Introduction. Differential uniformity
  • Basic properties of APN functions
  • EA- and CCZ-equivalence
  • Monomial APN functions
  • Polynomial APN functions
  • APN permutations
  • Differential equivalence of APN functions
  • Module 6. Foundations of quantum key distribution
  • Introduction to quantum information technology
  • Mathematical foundations of quantum informatics
  • Module 7. QKD protocols
  • Description of Quantum Key Distribution (QKD) protocol BB84
  • Intercept and resend attack on BB84 protocol
  • Description of QKD protocols B92 and E91
  • Module 8. Quantum key distribution: further implications
  • Basics of PNS attack
  • Key distillation
  • Examples of using