Cryptography

offerjudgeΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 9 μήνες)

99 εμφανίσεις

Cryptography


Number Theory











10
H
ours


Prime numbers, Euler’s Totient function, Fermat’s and Eulers Theorem, Primality

Testing, Chinese Remainder
Theorem, Discrete Logarithms, Group, Rings, Fields, Modular Arithmetic, Euclidean Algorithm, Finite Fields of the
form GF(p), Polynomial Arithmetic, Fields of the form GF(2
n
), Random Number Generation and Testing


Public Key Enc
ryption










10
Hours


RSA System, Implementing RSA, Attacks on RSA, Rabin Crypto System, Factoring algorithms. The (p
-
1) method,
Dixon’s algorithm and Quadratic sieve


Elliptic Curve Cryptography: Elliptic curves over GF(p),
Elliptic curves over GF(2
m
), Elliptic curve cryptography,
factoring with ECC, Key Management and Diffie Hellman Key Exchange,


Symmetric Encryption












8
Hours

Block Cipher and DES, The strength of DES, Differential and Linear Cryptana
lysis of DES, Advanced Encryption
Standard, Stream Ciphers and RC4,


Hash Functions













8
Hours

Hash Functions, Security of hash functions, MD5, Secure Hash Algorithm, Whirlpool, HMAC, CMAC, The
birthday attack problem.


Digital Signat
ures, Requirement, Authentication protocols, Digital Signature Standard, ECDSA


Finite Automata and Ciphers












6
Hours


Finite Automata and Ciphers, Structure of Ciphers, Selection of the Ma, h and g functions, Cipher Design using
Automata



References:



1.
Douglas R Stinson, “Cryptography Theory and practice”, CRC Press


2.
William Stallings, “Cryptography and Network Security 4e”, Pearson


3.
Simon J Shepherd, “Cryptography: Diffusing the Confusion”, Research press studies