Cryptology 2008

 

Debrup Chakraborty

 

Announcements:

 

1.     There will be no class on 12th and 15th February as Debrup would be out of station.

1.     Home work 1 posted. Due on Feb 22, 2008

2.     Home work 2  posted. Due on March 14, 2008

3.     Some Project Ideas, Submit a one page document telling about your project by Friday 14th March

4.     Home work 3  posted. Due on April 25, 2008

5.     Final test on April 29, 2008

6.       Projects due on May 6, 2008



 

Text Book:  Cryptography Theory and Practice by Douglas R. Stinson, Chapman and Hall

Class Hours:  Tuesday 4:00-6:00 PM and Friday 2:00-4:00 PM

 

 

Class schedule (shall be updated as we proceed)

 

 

Day

Date

Topic

Essential Reading

Other Readings and Links

1

15-01-2008

Introduction

Stinson Ch.1

 1. The Code book by Simon Singh

      http://www.simonsingh.net/Code_Book_Download.html

 

2

18-01-2008

Classical Ciphers

3

22-01-2008

Cryptanalysis of Some Classical Ciphers

4

25-01-2008

Perfect Secrecy

Stinson Ch. 2

 

5

29-01-2008

Block Ciphers: an Introduction

1. Stinson. 3

2. Bellare and Rogaway’s Notes

  1. Chapter 7, “Block Ciphers”, from Handbook of  Applied Cryptography by Menezes, Oorschot and Vanstone
  2. Don Coppersmith, “The DES and its strengths against attacks”, IBM Journal of Research and Development, vol. 38, no. 3, p. 243-50, May 1994
  3. “The Design of Rijndael" by Joan Daeman and Vincent Rijmen, Springer, 2002.
  4. NISTs page on AES

6

01-02-2008

Data Encryption Standard

7

05-02-2008

Advanced Encryption Standard

8

08-02-2008

Advanced Encryption Standard

9

19-02-2008

Linear and Differential Cryptanalysis

Stinson Ch. 3

  1. M. Matsui, "The first experimental cryptanalysis of the Data Encryption Standard", Advances in Cryptology--CRYPTO '94, pages 1-11.
  2.  M Matsui, “Linear Cryptanalysis Method for DES” , Eurocrypt 93, pp. 386-397
  3. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993. (older version online )
  4. Eli Biham, Adi Shamir,
    Differential Cryptanalysis of the Full 16-Round DES,
     Proceedings of Crypto'92, LNCS 740

10

22-02-2008

Block Cipher Modes of Operations

Stinson Ch. 3

  1. NIST SP 800-38A: Block Cipher Modes of Operation
  2. http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation

11

26-02-08

Block Cipher Modes of Operations

My modes page

12

29-02-08

Hash Functions

Stinson Ch. 4

 

13

04-03-08

14

07-03-08

15

11-03-08

Introduction to public key cryptology

 

 

16

14-03-08

Number theory primer

 

 

17

25-03-08

Test 1