At the end of the course the student is expected to
- Evaluate security of ciphers and hash functions by applying differential and linear cryptanalysis and their variants
- Estimate success probability, data complexity, time complexity and memory complexity of attacks