This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
1. Course Description As an introductory course to cryptography and information security, this
lecture introduces the security notions and basic building blocks of modern cryptography. We discuss two typical cryptosystems- symmetric cryptosystems that include block ciphers (DES and AES) and stream ciphers, and public key (asymmetric) cryptosystems like RSA, ElGamal, Elliptic Curve Cryptosystem, etc. The hash function, digital signature, key management and identification scheme including zero knowledge proof are also discussed. No prerequisites are required.
2. Textbook - Main Textbook : Douglas R. Stinson, Cryptography-Theory and Practice, 3rd Ed. CRC Press, 2006, ISBN 1-58488-508-4 - Recommended Reading Material : Menezes et al, Handbook of Applied
Cryptography, CRC Press, 1997, ISBN 0-8493-8523-7
- Handouts
3. Test and Evaluation - Midterm Exam: 20%, Final Exam:25% - Homework: 15% , Quiz:10%, Term Project : 25% , Attendance 5%
2 Block Cipher (I) Hw#1 10 Digital Signature (I) Qz#3
3 Block Cipher (II) Qz#1 11 Digital Signature (II) Hw#4
4 Cryptanalysis Hw#2 12 Identification Qz#4
5 Stream Cipher Qz#2 13 ZKIP/Key Management Hw#5
6 Hash Functions/ MAC TR#1 14 TP Presentation TR#2
7 Midterm Exam 15 Final Exam
8 Public Key Cryptosystem (I)
3
4
Related Subject
• Mathematics - Number Theory - Algebra : Group, Ring & Field Theory - Elliptic curves• Probability/ Statistics• Information Theory / Coding Theory• Computational Complexity - algorithm, Turing machine - NP-completeness• Quantum Computing, etc
• Industrial• Academic• Standard • Electronic Commerce• Service Provider• DRM/ Digital Watermark• Ubiquitous Security• Rule and Regulations• etc.
Traditional
Emerging Applications
Security anywhere
6
Worldwide Academic Research
• USA - IACR (International Association for Cryptologic Research) http://www.iacr.org/ : Crypto(‘81-), Eurocrypt(’82-), Asiacrypt(’91-), FSE, PKC, CHES - IEEE(Symposium on Privacy and Security) - ACM-CCS (Comp. & Comm. Security) - PKI Workshop(’01-), etc.
• Europe - ESORICS(European Symposium on Research in Computer Security) - EuroPKI(’04-), etc.
• Asia - Australia : Auscrypt(‘90-’92), ACISP (‘95-) - Japan : SCIS(‘84-), CSS(’02-), IWSEC(’06-) , Pairing(’07-) - Korea : KIISC (Korea Institute of Information Security and Cryptology) (’89-) http://www.kiisc.or.kr/, ICISC(‘97-), IWDW(’02-), WISA(’0-), IWAP(’00-) - China : ICICS(‘00-),ACNS(’02-) - Malaysia : Mycrypt(’05-) - India : Indocrypt (’99-), -Vietnam: Vietcrypt(’06-)
Authorization: conveyance, to another entity, of official sanction to do or be something.
Validation: a means to provide timeliness of authorization to use or manipulate information or services
Certification: endorsement of information by a trusted entity Revocation: retraction of certification or authorization Time stamping: recording the time of creation or existence of
information Witnessing : verifying the creation or existence of information by an
entity other than the creator Receipt: acknowledgement that information has been received Ownership: a means to provide an entity with the legal right to use
or transfer a resource to others Anonymity: concealing the identity of an entity involved in some
process
19
A taxonomy of cryptographic primitivesA taxonomy of cryptographic primitives
20
Unkeyed
Primitives
Symmetric-key
Primitives
Public-key
Primitives
arbitrary length hash functions
1-way permutations
RNG, PUF
symmetric-key ciphers
arbitrary length (keyed) hash functions(MAC)
Identification primitives
Identification primitives
signatures
public-key ciphers
Security
Primitives
block ciphers
stream ciphers
signatures
RNG(Random Number Generator), PUF(Physically Unclonable Function)
Attacking Model(I)Attacking Model(I)
By available information to attacker ◦COA (Ciphertext Only Attack)◦KPA (Known Plaintext Attack)◦CPA (Chosen Plaintext Attack)◦CCA (Chosen Ciphertext Attack) •Kerckhoff’s principle: knows the cryptosystem being used