<span dir="rtl">סגל הקורס - אוניברסיטת בן-גוריון בנגב</span>

AI and Robotics

Nov 21, 2013 (4 years and 5 months ago)

99 views

1

ןב תטיסרבינוא
-
בגנב ןוירוג

עבטה יעדמל הטלוקפה

-

בשחמה יעדמל הקלחמה

א רטסמס
'

ה"סשת

סרוק סובליס

סרוקה םש
:

היפרגוטפירק

Cryptography

סרוק 'סמ
:

202
-
1
-
5
3
51

?
«²Ÿ±?œŸ«
?????

?«²Ÿ±
ž²£¡›

? ?±ª
?
???
?
?
«²Ÿ±ž?ž°²¨
?
«Ÿ¨¬?¦¨££›?²?•
?
?
םדק תושירד

ימתירוג¦א ןונכת
ם
11
-
?
-
????
?
?

תורבתסה
241
-
?
-
????
?

?
The course is intended for third year undergraduate students as well as for graduate students.

תרטמ
אשונו
סרוקה

Webster dictionary defines cryptography as:
``The enciphering and deciphering of messages in secret
code

or cipher.''

However, modern cryptography is a much broader field; it provides algorithms and
protocols which protect honest parties from malicious parties. Malicious parties can, for example,
eavesdrop to the communication on the Internet and try to read

messages sent by other parties; they
can try to impersonate other parties, or login to computers without permission. Basic topics in
cryptography include secure encryption, digital signatures, and authentication
.

In this course we will discuss these topi
cs, their realizations, and applications. The material covers
cryptosystems that are both practical and theoretically interesting. To achieve this goal, we'll also
teach some background in number theory that is necessary to understand modern cryptosystems
such
as
RSA

תואצרהה יאשונ

All chapters refer to the book of Stinson. Some parts are not covered by the book.

1.

Introduction

o

Overview of course.

o

Classical cryptography [parts of Chapter 1].

2.

Secret Key Encryption

o

Perfect Secrecy
-

One time pads [Chapter 2.1].

o

Strea
m ciphers and the Data Encryption Standard (DES) [Chapter 3 (excluding 3.6)].

o

The Advanced Encryption Standard (AES)
-

adopted September 2000.

3.

Public Key Encryption

o

Factoring and the RSA encryption [Chapter 4.1
-

4.4].

o

Discrete log. Diffie
-
Hellman Key
Exchange [Chapter 8.4 (only pages 270
-
273)].

ElGamal encryption [Chapter 5 (only pages 162
-
164)] .

4.

Digital Signatures [Chapter 6 (excluding 6.5
-

6.6)]

o

One
-
time signatures.

2

o

Rabin and ElGamal signatures schemes.

o

Digital Signature Standard (DSS).

5.

Hashing

o

Motivation and applications. Cryptographically Secure Hashing. [Chapter 7.1
-
7.3,7.6]

o

Message Authentication Codes (MAC). CBC
-
MAC, HMAC.

6.

Network Security

o

Secure Socket Layer (SSL).

o

IPsec.

7.

Secret Sharing

o

Definition. Shamir's threshold scheme [
Chapter 11.1].

o

G
eneral secret sharing schemes.

8.

Advanced Topics: Private Information Retrieval, Secure Computation.

סרוקה תושירד

)...תיב יליגרת ,תוחכונ תבוח(

There will be about 5 homework assignments. These assignments
do not

include any programming.

יביכרמ
סרוקה ןויצ

Final exam, 75%. Students MUST PASS the exam to pass the course.

Homework assignments, 25%.

סרוקה תורפס

1.

D. R. Stinson.
CRYPTOGRAPHY: Theory and Practice.

Second Edition
CRC Press.
2002
.