Cryptography - Spring 2002
Dr. Amos Beimel
Webster dictionary defines cryptography as:
``The enciphering and
deciphering of messages in secret code or cipher.''
However, modern cryptography is a much broader field;
it provides algorithms and protocols which protect honest parties
from malicious parties.
Malicious parties can, for example, eavesdrop to the communication
on the Internet and try to read messages sent by other parties; they
can try to impersonate other parties, or login to computers without
permission. Basic topics in cryptography include secure encryption,
digital signatures, and authentication.
In this course I will
discuss these topics, their realizations, and applications.
The material covers
cryptosystems that are both practical and theoretically interesting.
To achieve this goal, I'll also teach some background in number theory that is
necessary to understand modern cryptosystems such as RSA.
This is a 4-credit course, consisting of two weekly 2-hour meetings.
It is intended third year undergraduate
students as well as for graduate students.
Pre-required course is the algorithms course.
Course Book:
-
D. R. Stinson. CRYPTOGRAPHY: Theory and Practice. CRC Press. 1995.
Other Books:
- A. J. Menezes, P. C. van Oorschot and S. A. Vanstone.
The Handbook of Applied Cryptography. CRC Press. 1996.
Available online.
- W. Stallings. Cryptography and Network
Security. Second Edition. Prentice Hall. 1998.
Grades:
Final exam, 70%. Students MUST PASS the exam to pass the course.
Homework assignments, 30%.
There will be about 5 homework assignments. These assignments do
not include any programming.
Information:
Lectures hours:
| Monday 18-20, Room 136 Building 90
|
| Tuesday 18-20, Room 109 Building 34
|
Reception hours:
| Tuesday 16-18, Room 205 Building 58 (Math and CS)
|
E-mail: |
beimel at cs.bgu.ac.il
|
Phone: | 647 7858
|
Course home page: |
www.cs.bgu.ac.il/~beimel/Courses/Crypto2002
|
Syllabus
All chapters refer to the book of Stinson. Some parts are not covered by
the book.
- Introduction
- Classical cryptography [parts of Chapter 1].
- Secret Key Encryption
- Perfect Secrecy - One time pads [Chapter 2.1].
- Stream ciphers and the Data Encryption Standard (DES)
[Chapter 3 (excluding 3.6)].
- The Advanced Encryption Standard (AES) - adopted September 2000.
- Public Key Encryption
- Factoring and the RSA encryption
[Chapter 4.1 - 4.4].
- Discrete log. Diffie-Hellman Key Exchange
[Chapter 8.4 (only pages 270-273)].
ElGamal
encryption [Chapter 5 (only pages 162-164)] .
- Digital Signatures [Chapter 6 (excluding 6.5 - 6.6)]
- One-time signatures.
- Rabin and ElGamal signatures schemes.
- Digital Signature Standard (DSS).
- Hashing
- Motivation and applications. Cryptographically Secure
Hashing. [Chapter 7.1-7.3,7.6]
- Message Authentication Codes (MAC). HMAC.
- Network Security
- Secure Socket Layer (SSL).
- IPsec.
- Secret Sharing
- Definition. Shamir's threshold scheme [Chapter 11.1].
- Visual secret sharing schemes.