Εφαρμοσμένη Κρυπτογραφία
Ενότητες
Learning Outcomes
On successful completion of this module, students should be able to:
- Analyze scientific research papers and describe the use of cryptographic algorithms to satisfy security requirements.
- Propose appropriate algorithms and cryptosystems based on the system’s security requirements.
- Develop cryptosystems to satisfy confidentiality, integrity and authentication requirements.
- Design cryptographic authentication and key agreement protocols, as well as zero-knowledge. Protocols.
- Explain the use of trust services and the corresponding legal framework.
- Analyze security properties for blockchains and propose appropriate uses.
- Deploy blockchain solutions to satisfy security requirements.