Headings denoted with an asterisk ( * ) is retrieved from the course syllabus version Spring 2026
Content and learning outcomes
Course contents
Classic cryptosystems. What does secure encryption mean? Background in information theory, entropy. Symmetric encryption algorithms such as Advanced Encryption Standard (AES). Open key systems for encryption and digital signatures e.g. RSA, ElGamal and Schnorr signatures. Cryptographically secure hash functions in theory and practice (SHA). Properties and examples of pseudo-random number generators. Connections to complexity theory.
Intended learning outcomes
After passing the course, the student shall be able to
discuss the following basic concepts in cryptography: symmetric and asymmetric encryption, digital signatures, cryptographic hash functions, and strong pseudo-random number generator
give examples of the above concepts
perform simple own analyzes of cryptographic constructions such as cryptographic systems and cryptographic protocols
determine the reliability of analyzes of cryptographic constructions such as cryptographic systems and cryptographic protocols
summarize the content of technical articles on cryptography and cryptographic protocols
in order to be able to work with analysis and development of cryptographic protocols and systems.
Preparations before course start
Recommended prerequisites
Knowledge equivalent to either one of the courses DD1352 Algorithms, Data Structures and Complexity or DD2354 Algorithms and Complexity and knowledge of probability theory, mathematics and algorithm theory acquired in the mandatory courses of the D or F program.
Literature
No information inserted
Support for students with disabilities
Students at KTH with a permanent disability can get support during studies from Funka:
GRU1 - Group work, 2.5 credits, grading scale: P, F
INDA - Individual home assignment, 5.0 credits, grading scale: A, B, C, D, E, FX, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
If the course is discontinued, students may request to be examined during the following two academic years.
Ethical approach
All members of a group are responsible for the group's work.
In any assessment, every student shall honestly disclose any help received and sources used.
In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.