Cryptography

Principal
Lecture Plan
Text Books
Assessment
Web Sites
Search
Course Material
Practices

PROGRAM THEORETIC:

bulletCHAPTER 1. INTRODUCTION
bullet History: Caesar. Spartan Scitala. Mechanical Encryption Devices. Future.
bulletBasic Definitions. Necessities. Goals. Kerckhoffs' Rules.
bullet Concept of Security: Theoretical and Practical Security.
bullet Cryptographic Attacks. General Classification of Cryptographic Systems.
bullet Classical Cryptosystems: Transposition. Substitution. Vernam Cipher.
bullet Elemental Cryptanalysis : Statistical Attack.  Kasiski's Method
bulletCHAPTER 2. MATHEMATICAL BACKGROUND
bullet Basic Notions of  Information Theory: Entropy, uncertainty, Perfect Secrecy, Unicity Distance. Confusion and Diffusion.
bullet Basic Notions of Number Theory:  Modular Arithmetic, Prime Numbers, Discrete Logarithms, Galois Fields.
bullet Basic Notions of Complexity Theory: Complexity of Algorithms and of Problems, NP-Complete Problems.
bulletCHAPTER 3. SECRET-KEY CRYPTOGRAPHY: STREAM CIPHER
bullet Definitions. Synchronism.
bullet Randomness Characteristics: Golomb Postulates.
bulletShift Register Sequences.
bullet Linear Complexity. The Berlekamp-Massey Algorithm.
bullet Non-Linear Algorithms .  Non-Linear Filter. Non-Linear Combiner.
bullet Methodology for Practical Design. 
bullet Best-known generators: Geffe, Beth-Piper, Massey-Rueppel...
bulletCHAPTER 4. SECRET-KEY CRYPTOGRAPHY: BLOCK CIPHER
bullet General Principles. Feistel Ciphers.  Cipher Modes.
bullet DES Algorithm. Design. Triple DES.
bulletOther Algorithms: IDEA, RC5, Rijndael...
bulletDifferential Cryptanalysis.
bulletCHAPTER 5. KEY MANAGEMENT
bullet Types of Keys. Key Length. Lifetime of Keys.
bullet Generation. Storage. Distribution. Transference. Verification. Destruction.
bulletKey Management on Computer Networks.
bullet Diffie-Hellman Protocol for Key Exchange. Public-Key Management.
bulletCHAPTER 6. PUBLIC-KEY CRYPTOGRAPHY
bullet One-way Functions. Trapdoor Functions.
bullet ElGamal Cryptosystem. Security of ElGamal Cryptosystem.
bullet RSA Cryptosystem. Security of  RSA. Rabin Cryptosystem.
bullet Knapsack Cryptosystems. Security of Chor-Rivest Cryptosystem.
bullet Basic Notions of Coding Theory. McEliece Cryptosystem.
bullet Basic Notions of Elliptic Curves. Elliptic Curves Based Cryptosystems.
bulletCHAPTER 7. CRYPTOGRAPHIC APPLICATIONS  
bullet Authentication. Mathematical Model. Types of Schemes.
bullet Digital Signatures. Hash Functions.
bullet Identification  Schemes. Passwords. Strong Schemes.
bullet Secret Sharing Protocols. Threshold Schemes.
bullet Subliminal Channel Protocols.  
bulletCoin Flipping Protocols. Mental Poker.
bulletZero-Knowledge Protocols.
bullet Oblivious Transfer  and Contract Signing Protocols.
bulletSecure Election Protocols.

Principal | Lecture Plan | Text Books | Assessment | Web Sites | Search | Course Material | Practices

This page is currently undergoing heavy restructuring, and will be actively modified, so you are invited to check it regularly.

Let us now of any error you find in the course web pages to [pcaballe@ull.es] or [mchgoya@ull.es]

 Last modified: jul-04.