Overview
One of the most important rules of cryptography is: "Never implement your own crypto-functions!" In this practical course we will completely and utterly wreck that rule. Instead of using standardised approaches such as TLS and their implementation counterparts such as OpenSSL, students of this course will standardise and implement their own protocol.
Using symmetric and asymmetric algorithms, Message Authentication Codes and a Zero Knowledge proof, we will create an authentication method with the whole course. Then each group will implement this standard and try to achieve interoperability with the other groups. A final presentation will conclude the course.
The following technologies are sure to be featured in this course:
We expect some basics from the participants in order to make this course work: