Cryptographic Protocols

This course is part of the Security and Privacy MSc program of the EIT ICT Labs Master School.

Past years

2013 fall semster
2014 fall semster


Dr. Levente Buttyán, Associate Professor
BME Department of Networked Systems and Services,
Laboratory of Cryptography and System Security (CrySyS)

Course objectives

This course gives an overview of the basic building blocks used to engineer cryptographic protocols, and discusses in details the operation of mainstream cryptographic protocols used in wired and wireless computer networks. In particular, TLS and IPsec are covered, as well as security protocols in WiFi networks. We also study protocols used in emerging wireless networks, such as wireless sensor networks and RFID systems.

Assessment and Grading Procedures

Oral exam at the end. Solving the homework assignments as a perquisite. Final grade depends on both the exam and the result of the homework assignments (75-25%)

Schedule and room

When Where
See table below... BME Info building, IE.460

Course outline and material

Date, Time Topic
Nov 2, 2015, 13:15-16:00 History of cryptography (slides)
Nov 9, 2015, 13:15-16:00 Symmetric key ciphers (slides)
Nov 13, 2015, 09:15-12:00 Block cipher modes and attacks (slides)
Nov 13, 2015, 13:15-16:00 Message authentication and authenticated encryption (slides)
Nov 16, 2015, 13:15-16:00 Public key ciphers and digital signatures (slides)
Nov 20, 2015, 09:15-12:00 Key exchange protocols (slides) and password based key derivation (slides)
Nov 20, 2015, 13:15-16:00 Random number generation (slides) and public key infrastructure (slides)
Nov 23, 2015, 13:15-16:00 WiFi security (slides)
Nov 24, 2015, 13:15-16:00 Transport Layer Security (slides)
Nov 30, 2015, 13:15-16:00 Crypto protocols for resource constrained networks (slides)
Dec 1, 2015, 13:15-16:00 Cryptographic obfuscation (slides)
Dec 4, 2015, 09:15-12:00 Crypto protocols for enhancing privacy (slides)
Dec 4, 2015, 13:15-16:00 Use of cryptography in malware (slides)

Recommended supplementary material

Important note: Currently, Avatao is available only for invited people. If you want to use Avatao to access hands-on challenges related to the course, please sign up at When signing up, please put the string "EIT Digital 2015" in the optional comment field in order for us to know that you are a student in the EIT Digital Master Program. We will then send you an invitation e-mail and you can complete the registration by following the instructions given in that e-mail.