All chapters refer to the book:
- D. R. Stinson. CRYPTOGRAPHY: Theory and Practice. Third Edition. CRC Press. 2006.
| Num. | Topic | Date | Handouts | Chapter from textbook |
| 1 | Introduction. | 16.11.08 | ||
| 2 | Classic encryptions and their cryptanalysis. | 17.11.08 | Frequency Table Vigenre Applet (from UCSD) |
1 |
| 3 | Perfect encryption systems. | 23.11.08 | 2.1-2.3 | |
| 4 | Data Encryption Standard (DES). | 24.11.08 | DES Specification | 3.5 |
| 5 | Attacks on DES. Linear Cryptanalysis. | 230.11.08 | ppt file. [Matsui], [Matsui1] | 3.5 |
| 6 | Modes of Operations.
Advanced Encryption Standard (AES). |
1.12.08 | AES Animation, Fips 197 |
3.7 3.6 |
| 7 | Basic Number Theory, The Euclidean Algorithm. | 7.12.08 | ||
| 8 | Chinese Remainder and the Euler function. | 8.12.08 | 5.2.1,5.2.2 | |
| 9 | The structure of Zm*, Generators and Quadratic Residues in Zp*. | 14.12.08 | ||
| 10 | Quadratic Residues, Roots, and Primality Testing. | 15.12.08 | ||
| 11 | Public key encryption, RSA public key encryption. | 21.12.08 | 5.1,5.3,5.7 | |
| 12 | Attacks on the RSA. | 22.12.08 | [Boneh] | |
| 13 | Diffie-Hellman Key Exchange, ElGamal Encryption. | 29.12.08 | 6.1 | |
| 14 | Definition of Secure Encryption. ElGamal Encryption is Secure. | 19.1.09 | ||
| 15 | Digital Signatures: RSA and Rabin Signatures. | 25.1.09 | 7.1,7.2, 5.8 (modified) | |
| 16 | ElGamal and DSA Signatures. | 26.1.09 | 7.3,FIPS 186-2 - DSS | |
| 17 | Cryptographic hash functions | 1.2.09 | 4.1,4.2 | |
| 18 | Message authentication, CBC-MAC, HMAC. | 2.2.09 | BCK.pdf | 4.4 |
| 19 | Secure Socket Layer (SSL). | 8.2.09 | SSL lecture |   |
| 20 | Secret Sharing. | 9.2.09 | ||
| 21 | General Secret Sharing. | 15.2.09 | ||
| 22 | Private information retrieval. | 16.2.09 | survey.pdf | |
| 23 | Secure function evaluation. | 22.2.09 | ||
| 24 | Course summary. | 23.2.09 |
References
[Matsui] M. Matsui. Linear Cryptanalysis Method for DES Cipher. In EUROCRYPT 93, vol. 765 of Lecture Notes in Computer Science, pages 386–397, Springer-Verlag, 1994.[Matsui1] M. Matsui. The first experimental cryptanalysis of the Data Encryption Standard. In CRYPT0 94, vol. 839 of Lecture Notes in Computer Science, pages 1–11, Springer-Verlag, 1994.
[Boneh] D. Boneh. Twenty years of attacks on the RSA Cryptosystem. In Notices of the American Mathematical Society (AMS), Vol. 46, No. 2, pp. 203–213, 1999.
[DSS] NIST, FIPS 186-2, Digital Signature Standard (DSS).
[BCK1] M. Bellare, R. Canetti, and H. Krawczyk. The HMAC Construction (pdf). CryptoBytes, Vol. 2, No 1, pages 12-15, 1996.
[BCK2] M. Bellare, R. Canetti, and H. Krawczyk. Keying Hash Functions for Message Authentication. Abridged version appears in CRYPTO '96, vol. 1109 of Lecture Notes in Computer Science, pages 1-15, Springer-Verlag, 1996.
[Stallings] W. Stallings. Cryptography and Network Security. Second Edition. Prentice Hall. 1998.