Secure Protocol Design

FA2025

crypto

Learning Objectives

  • CIA triad as applied to protocols and cryptography
  • Symmetric cryptography primitives
    • Block ciphers
    • Message authentication codes (MAC)
    • Authenticated Encryption (AE) with Associated Data (AEAD)
    • Attacks
      • Chosen Plaintext Attack (CPA)
      • Chosen Ciphertext Attack (CCA)
  • Cryptographic hash functions
  • Asymmetric cryptography primitives
    • Encryption
    • Digital signatures
  • How to design a protocol?
    • Case study: 2025 eCTF protocol
    • Case study: 2024 eCTF protocol