  | CHAPTER 1. 
  INTRODUCTION 
  
  
      | 
    History:  Caesar. Spartan Scitala. 
    Mechanical Encryption Devices. Future. 
     |  
      | Basic 
    Definitions. Necessities. Goals. Kerckhoffs' Rules. 
     |  
      | 
    Concept of Security: Theoretical 
    and Practical Security.  |  
      | 
    Cryptographic Attacks. 
    General Classification of Cryptographic Systems. 
     |  
      | 
    Classical Cryptosystems: 
    Transposition. Substitution.  Vernam Cipher. |  
      | 
    Elemental Cryptanalysis : Statistical 
    Attack.  Kasiski's Method  |  
   
   | 
    | CHAPTER 2. 
  MATHEMATICAL BACKGROUND 
  
  
      | 
    Basic Notions of  Information 
    Theory: 
    Entropy, uncertainty, Perfect Secrecy, Unicity Distance. Confusion and Diffusion.
     |  
      | 
    Basic Notions of Number Theory:  
    Modular Arithmetic, Prime Numbers, 
    Discrete 
    Logarithms, 
    Galois Fields. |  
      | 
    Basic Notions of Complexity
    
    Theory: 
    Complexity of Algorithms and of Problems, NP-Complete Problems. |  
   
   | 
    | CHAPTER 3. 
  SECRET-KEY 
  CRYPTOGRAPHY: STREAM CIPHER
      | 
    Definitions. 
    Synchronism.  |  
      | 
    Randomness Characteristics: 
     
    Golomb Postulates. 
     |  
      | Shift Register Sequences. 
     |  
      | 
    Linear Complexity.  The Berlekamp-Massey Algorithm.
    
     |  
      | 
    Non-Linear Algorithms .  
    Non-Linear Filter. Non-Linear Combiner.  |  
      | 
    Methodology 
    for Practical Design.   |  
      | 
    Best-known generators: Geffe,
    
    Beth-Piper, Massey-Rueppel... |  
   
   | 
    | CHAPTER 4. 
  SECRET-KEY CRYPTOGRAPHY: BLOCK CIPHER 
  
      | 
    General Principles. Feistel 
    Ciphers.  Cipher 
    Modes.  |  
      | 
    DES Algorithm. 
    Design. Triple DES.  |  
      | Other Algorithms: IDEA, RC5, Rijndael... |  
      | Differential 
    Cryptanalysis.  |  
   
   | 
    | CHAPTER 5. 
  KEY MANAGEMENT 
  
      | 
    Types 
    of Keys. Key Length. Lifetime of Keys. |  
      | 
    Generation. Storage. Distribution. Transference. 
    Verification. Destruction. |  
      | Key Management on Computer Networks.
     |  
      | 
    Diffie-Hellman Protocol for Key Exchange. 
    Public-Key Management. |  
   
   | 
    | CHAPTER 6. 
  PUBLIC-KEY CRYPTOGRAPHY
      | 
    One-way Functions. Trapdoor Functions.
    
     |  
      | 
    ElGamal Cryptosystem. Security 
    of ElGamal 
    Cryptosystem. 
     |  
      | 
    RSA Cryptosystem. 
    Security of  RSA. Rabin Cryptosystem. |  
      | 
    Knapsack 
    Cryptosystems. 
    Security of 
    Chor-Rivest Cryptosystem. |  
      | 
    Basic Notions 
    
    of Coding 
    Theory. McEliece Cryptosystem.  |  
      | 
    Basic Notions of Elliptic Curves. Elliptic Curves 
    Based Cryptosystems. 
     |  
   
   | 
    | CHAPTER 7. CRYPTOGRAPHIC APPLICATIONS
   
      | 
    Authentication. 
    Mathematical Model. Types 
    of Schemes. |  
      | 
    Digital 
    Signatures. Hash 
    Functions.  |  
      | 
    Identification  Schemes. Passwords. Strong Schemes. |  
      | 
    Secret 
    Sharing Protocols. Threshold Schemes.  |  
      | 
    Subliminal 
    Channel Protocols.   |  
      | Coin Flipping Protocols. 
    Mental Poker.  |  
      | Zero-Knowledge Protocols. 
     |  
      | 
    Oblivious Transfer  and Contract Signing 
    Protocols.  |  
      | Secure Election  Protocols. |  
   
   |