Annual Computer Security Applications Conference (ACSAC) 2012

Full Program »

M5: Contemporary Cryptography

Monday, 3 December 2012
13:30 - 17:00



Cryptography is a key technology to secure the Internet applications we build, use, and depend on in daily life. Due to a lot of research and development activities in the past 40 years, cryptography is a broad field of study with many aspects that are inherently difficult to understand. In this course, we overview, discuss, and put into perspective the various cryptographic systems in use today. This includes unkeyed cryptosystems in terms of one-way function, cryptographic hash functions, and random bit generators; secret key cryptosystems in terms of symmetric encryption systems, message authentication systems, and pseudorandom bit generators; as well as public key cryptosystems in terms of asymmetric encryption systems, digital signature systems, and key establishment protocols. The aim is to provide a basic understanding of the advantages and disadvantages of the various systems, without going too deep into algorithmic details.

Prerequisites: None.


  1. Introduction [20 min]
  2. Cryptographic Systems [20 min]
  3. One-Way Functions [20 min]
  4. Cryptographic Hash Functions [20 min]
  5. Random Bit Generators [15 min]
  6. Symmetric Encryption Systems [45 min]
  7. Message Authentication Systems [20 min]
  8. Pseudorandom Bit Generators [15 min]
  9. Pseudorandom Functions [10 min]
  10. Asymmetric Encryption Systems [45 hour]
  11. Digital Signature Systems [45 hour]
  12. Key Establishment [20 min]
  13. Entity Authentication  [20 min]
  14. Secure Multi-Party Computation [15 min]
  15. Key Management [15 min]
  16. Conclusions and Outlook [15 min]

About the Instructor:

Dr. Rolf Oppliger studied computer science, mathematics, and economics at the University of Berne, Switzerland, where he received M.Sc. and Ph.D. degrees in computer science in 1991 and 1993, respectively. In 1999, he received the venia legendi for computer science from the University of Zurich, Switzerland, where he was appointed adjunct professor in 2007. The focus of his professional activities is on technical information security and privacy. In these areas, he has published many books and scientific articles and papers, regularly participates at conferences and workshops (both as contributor and member of the respective program committees), serves on the editorial board of some leading magazines and journals (e.g., IEEE Computer and Security & Privacy), and is the editor of the Artech House information security and privacy book series. He's the founder and owner of eSECURITY Technologies, works part-time for the Swiss Federal IT Steering Unit (FITSU), and teaches at the University of Zurich. He is a senior member and distinguished speaker of the Association for Computing Machinery (ACM), and a member of the IEEE Computer Society and the International Association for Cryptologic Research (IACR). He also served as vice-chair of the IFIP TC 11 working group on network security.


Powered by OpenConf®
Copyright©2002-2014 Zakon Group LLC