[Forside] [Hovedområder] [Perioder] [Udannelser] [Alle kurser på en side]
The student must gain insight into the techniques in connection with concealment of information and securing authenticity and integrity. The student must become acquainted with classic and current cryptology systems.
None
Klaus Kolle, et al
Lectures and self-study, mainly
Danish
William Stallings: Cryptography and Network Security
Principles and Practice
The latest research results are included in the course. A list of relevant papers is added to the reading list.
Exam form Project incl. oral defence.
Exam evaluation Internal censor
Marking scale 7-step-scale