 | CHAPTER 1.
INTRODUCTION
 |
History: Caesar. Spartan Scitala.
Mechanical Encryption Devices. Future.
|
 | Basic
Definitions. Necessities. Goals. Kerckhoffs' Rules.
|
 |
Concept of Security: Theoretical
and Practical Security. |
 |
Cryptographic Attacks.
General Classification of Cryptographic Systems.
|
 |
Classical Cryptosystems:
Transposition. Substitution. Vernam Cipher. |
 |
Elemental Cryptanalysis : Statistical
Attack. Kasiski's Method |
|
 | CHAPTER 2.
MATHEMATICAL BACKGROUND
 |
Basic Notions of Information
Theory:
Entropy, uncertainty, Perfect Secrecy, Unicity Distance. Confusion and Diffusion.
|
 |
Basic Notions of Number Theory:
Modular Arithmetic, Prime Numbers,
Discrete
Logarithms,
Galois Fields. |
 |
Basic Notions of Complexity
Theory:
Complexity of Algorithms and of Problems, NP-Complete Problems. |
|
 | CHAPTER 3.
SECRET-KEY
CRYPTOGRAPHY: STREAM CIPHER
 |
Definitions.
Synchronism. |
 |
Randomness Characteristics:
Golomb Postulates.
|
 | Shift Register Sequences.
|
 |
Linear Complexity. The Berlekamp-Massey Algorithm.
|
 |
Non-Linear Algorithms .
Non-Linear Filter. Non-Linear Combiner. |
 |
Methodology
for Practical Design. |
 |
Best-known generators: Geffe,
Beth-Piper, Massey-Rueppel... |
|
 | CHAPTER 4.
SECRET-KEY CRYPTOGRAPHY: BLOCK CIPHER
 |
General Principles. Feistel
Ciphers. Cipher
Modes. |
 |
DES Algorithm.
Design. Triple DES. |
 | Other Algorithms: IDEA, RC5, Rijndael... |
 | Differential
Cryptanalysis. |
|
 | CHAPTER 5.
KEY MANAGEMENT
 |
Types
of Keys. Key Length. Lifetime of Keys. |
 |
Generation. Storage. Distribution. Transference.
Verification. Destruction. |
 | Key Management on Computer Networks.
|
 |
Diffie-Hellman Protocol for Key Exchange.
Public-Key Management. |
|
 | CHAPTER 6.
PUBLIC-KEY CRYPTOGRAPHY
 |
One-way Functions. Trapdoor Functions.
|
 |
ElGamal Cryptosystem. Security
of ElGamal
Cryptosystem.
|
 |
RSA Cryptosystem.
Security of RSA. Rabin Cryptosystem. |
 |
Knapsack
Cryptosystems.
Security of
Chor-Rivest Cryptosystem. |
 |
Basic Notions
of Coding
Theory. McEliece Cryptosystem. |
 |
Basic Notions of Elliptic Curves. Elliptic Curves
Based Cryptosystems.
|
|
 | CHAPTER 7. CRYPTOGRAPHIC APPLICATIONS
 |
Authentication.
Mathematical Model. Types
of Schemes. |
 |
Digital
Signatures. Hash
Functions. |
 |
Identification Schemes. Passwords. Strong Schemes. |
 |
Secret
Sharing Protocols. Threshold Schemes. |
 |
Subliminal
Channel Protocols. |
 | Coin Flipping Protocols.
Mental Poker. |
 | Zero-Knowledge Protocols.
|
 |
Oblivious Transfer and Contract Signing
Protocols. |
 | Secure Election Protocols. |
|