##### Secciones
Usted está aquí: Exercises and projects

# Exercises and projects

##### Acciones de Documento
Autores: Ana I. González-Tablas Ferreres, José M. de Fuentes García-Romero de Tejada, Lorena González Manzano, Sergio Pastrana Portillo
En esta sección encontramos un conjunto de ejercicios o problemas de la asignatura, trabajos o proyectos a realizar en la asignatura, estudios de casos, estudios dirigidos, ...

### PART 1: Introduction to cryptography and fundamentals

Next, exercises related to modules 1 and 4 of this course and their solutions are presented. Module 1 exercises allow students to practice mathematical skills that will be needed to solve the exercises of next modules.  In module 4 exercises, students will practice simple encryption and decryption techniques using classical cryptographic algorithms. Modules 2 and 3 do not have exercises associated as they are mostly theoretical.

• EP-F-001. Exercises of Module 1. Mathematical fundamentals of cryptography ( PDF ).
• ER-F-001 Solutions of Exercises of Module 1. Mathematical fundamentals of cryptography ( PDF ).
• EP-F-002. Exercises of Module 4. Classical cryptography and its cryptanalysis ( PDF ).
• ER-F-002 Solutions of Exercises of Module 4. Classical cryptography and its cryptanalysis ( PDF ).

### PART 2: Mechanisms to achieve message confidentiality

Next, a set of exercises with their solutions will allow students to practice with the numerical and algorithmic methods used in current cryptosystems.

• EP-F-003. Exercises of Module 5. Symmetric encryption: Block ciphers ( PDF ).
• ER-F-003 Solutions of Exercises of Module 5. Symmetric encryption: Block ciphers ( PDF ).
• EP-F-004. Exercises of Module 6. Symmetric encryption: Stream ciphers ( PDF ).
• ER-F-004 Solutions of Exercises of Module 6. Symmetric encryption: Stream ciphers ( PDF ).
• EP-F-005. Exercises of Module 7. Asymmetric encryption ( PDF ).
• ER-F-005 Solutions of Exercises of Module 7. Asymmetric encryption ( PDF ).
• EP-F-006. Exercises of Module 8: Key distribution and management ( PDF ).
• ER-F-006 Solutions of Exercises of Module 8: Key distribution and management ( PDF ).

### PART 3: Mechanisms to achieve message integrity and authentication

Next is a set of exercises, and their solutions, that will allow the student to practice the numerical and algorithmic methods contemplated in the current message authentication mechanisms. Note that there are not specific exercises for modules 9 and 10, which address hash functions and message authentication codes. The reason is that the numerical methods of these mechanisms are discussed with less detail. Even so, exercises of modules 11 and 12 usually include simplifications of these type of mechanisms.

• EP-F-007. Exercises of Module 11: Digital signature schemes ( PDF ).
• ER-F-007 Solutions of Exercises of Module 11: Digital signature schemes ( PDF ).
• EP-F-008. Exercises of Module 12: Public key infrastructures ( PDF ).
• ER-F-008 Solutions of Exercises of Module 12: Public key infrastructures ( PDF )

### PART 4: User authentication mechanisms

Module 13 does not have any related exercise, as it is studied in less detail than previous ones. User authentication methods addressed in this module combined algorithms and techniques studied in previous modules of this course.

Reutilizar Curso
Descargar este curso 