Cryptology 2012

Instructor: Debrup Chakraborty (debrup(AT)cs.cinvestav.mx)

References : [KL] Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell

[ST] Cryptography: Theory and Practice, by Doughlas R. Stinson

[MOV] Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot and S. Vanstone. (Available online for free)

Classes: Mondays and Wednesdays 10:00 to 12:00

Grading: 40% on homeworks, 40% on tests and 20% on a project.

Homeworks: Homework 2 (due 5th March)

Homework 3 (due 2nd April)

Tentative Schedule (details to be filled up as we proceed)

- 23rd Jan Introduction

- 25th Jan Perfect
Secrecy: Definition of perfect secrecy, variants of the
definition. One time pad. Shannon's Theorem.

(Read [KL] Chapter 2)

- 30th Jan Block
Ciphers: Definition of block ciphers, the paradigm of
substitution permutation networks. Description of the data
encryption standard.

(Read [ST] Chapter 3)

- 1st Feb Block Ciphers: Description of the advanced
encryption standard.

Read [ST] Chapter 3)

- 6th Feb No Class

- 8th Feb Block Ciphers: Key recovery attacks on block
ciphers.

notes by Phil Rogaway

- 10th Feb Block Ciphers: Issues in
hardware implementations of the AES. Lectured by Cuauhtemoc
Mancillas Lopez.

Slides

- 13th Feb Block Ciphers: Issues in
software implementations of the AES. Lectured by Nallely Trejo.

Slides

- 15th Feb Pseudorandom
Functions/Permutations

notes by Phil Rogaway

- 20th Feb Pseudorandom Functions/Permutations

- 22nd Feb Symmetric
Encryption and Block Cipher Modes of Operation: The
CBC and CTR modes of operations with variants.

The IND-CPA notion of security.

notes by Phil Rogaway

- 29th Feb Symmetric
Encryption and Block Cipher Modes of Operation: The
proof of security of CTR mode.

- 2nd Mar Cryptographic
Hash functions: Preimage resistance, Second preimage
resistance and collision resistance. The random oracle

model. Generic algoritms for finding preimage, second preimage and collisions in the random oracle model. Relation between the notions of

Preimage resistance, Second preimage resistance and collision resistance.

Read [ST] Chapter 4 - 05th Mar Cryptographic
Hash functions: Iterated hash functions. Constructing
hash functions from a given compression function,

the Merkle-Damgard construction .

Read [ST] Chapter 4 - 07th Mar Message
Authentication: The problem of message authentication,
Keyed hash families, Almost universal and Almost Xor universal

hash functions, polynomial hashes and the Wegman Carter paradigm of MACs.

- 12th Mar Message
authentication: Extending the domain of a pseudorandom
function using a AU hash function.

Block cipher based message authentication codes: CBC MAC, CMAC, PMAC

- 14th Mar Authenticated
Encryption: Generic composition. Security of AE. AEAD
schemes. The GCM mode, the OCB mode

Additional reading: Introductory article by John Black, The GCM mode, The OCB2 mode

- 19th Mar No class

- 21st Mar Test 1
- 26th Mar Number theoretic preliminaries
- 28th Mar Public Key Cryptography: RSA, Elgamal
- 02nd Apr No Class
- 04th Apr No Class
- 09th Apr Public Key Cryptography: RSA, ElGamal
- 11th Apr Signature Schemes
- 16th Apr Elliptic Curves
- 18th Apr Elliptic Curves
- 23rd Apr Review
- 25th Apr Test 2