Cryptology System Design Fundamentals (ET-IDA-110)
Lecture is offerd in WS 2023-2024 online, and exercises in presence. 
 Interested TU-BS students are kindly asked to register via Stud IP system.
 The lecture time would be agreed on with the interrested participants to avoid collisions.
For further questions please contact Mrs Randa Zarrouk by E-Mail to (randa.zarrouk@tu-bs.de)
To register your interrest: send an email including your educational and academic background to: randa.zarrouk@tu-bs.de
Instructor: Prof. W. Adi
 Credit points: 5 ECP: 2 lecture hours + 1 exercise hour + additional exercise/week
 Prerequisites: Knowledge of basic algebra
 Course Materials: Course handouts would be offered at lecture time
 Course language: English
 Lecture Material: Lecture-Slides (klick-here)
Lecture Material: Lecture-Slides (klick-here)
Course Contents:
 The lecture offers an engineering approach to the analysis and design of modern security primitives and protocols. The tutorials include intensive mathematical training to cover skills in using the special arithmetic and algebra deployed in modern security systems.
1- Basic mathematics and arithmetic for cryptographic applications. A number theoretical Introduction in 4 blocks:
      a- Remainder arithmetic
      b- Groups, Rings and Fields
      c- Prime Numbers
      d- Extesion fields
 2- Hostorical overview, Secrecy Theory
 3- Stram Ciphers and their design fundamentals
 4- Block Ciphers and standards
 5- Public-key Concept and Deffie-Hellman key-exchange system
 6- RSA Public-key System
 7- ElGamal Crypto-System
 8- Quadratic Residues and Rabin-Lock
 9- Elliptic-Curve Locks and standards
 10- Cryptographic Protocols
 11- Physical Security, Secured Identity and Physical-Unclonability
 12- Identification Systems. Secret-key Identification. Public-key Identification and Signature
  
Course Targets:
 The participants are expected to gain fundamental understanding and skills in:
 - Arithmetic skills for modern security systems
 - Fundametals of secrecy theory
 - Designing basic secret-key and public-key security primitives and protocols