C - Cryptography

Similar documents
C - Cryptography

SI - Computer Security

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS

SUMMARY OF INFORMATION ON EACH COURSE

Channel Coding and Cryptography Part II: Introduction to Cryptography

KALASALINGAM UNIVERSITY

Cryptography. Dr. Michael Schneider October 10, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1

Public-Key Cryptanalysis

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

Dual Encryption by Random Segmentation and Random Re-Arrangement (RSRA) using Two Dimensional Array

Public Key Cryptography

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

AD - Distributed Applications

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS. Arash Eghdamian 1*, Azman Samsudin 1

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

CASO - Advanced Concepts on Operating Systems

Journal of Computer Engineering & Technology (JCET) ISSN (Print), ISSN (Online), Volume 1, Issue 1, July-December (2013)

Public Key Cryptography. Toni Bluher Women and Mathematics Program Lecture 2 May 22, 2018

Diffie-Hellman Protocol as a Symmetric Cryptosystem

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

SOA - Advanced Operating Systems

Key Exchange. Secure Software Systems

Security Protocols and Infrastructures

Network Security. Chapter 4 Public Key Cryptography. Public Key Cryptography (4) Public Key Cryptography

COURSE DESCRIPTION. 3. Total estimated hours (hours per semester and didactic activities)

CPD - Data Processing Centers

The Application of Elliptic Curves Cryptography in Embedded Systems

A SIMPLIFIED IDEA ALGORITHM

SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation

Public Key Algorithms

CRYPTOGRAPHY AND NETWORK SECURITY

A Comparative Study of Public Key Cryptosystem based on ECC and RSA

SRI VENKATESWARA COLLEGE OF ENGINEERING

Software to Encrypt Messages Using Public- Key Cryptography

Public-Key Cryptography

Public Key Cryptography

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

- 0 - CryptoLib: Cryptography in Software John B. Lacy 1 Donald P. Mitchell 2 William M. Schell 3 AT&T Bell Laboratories ABSTRACT

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security: Principles and Practice

Computer Security 3/23/18

Faculty of Science & Information Technology

Side-Channel Attacks on RSA with CRT. Weakness of RSA Alexander Kozak Jared Vanderbeck

Netzwerksicherheit [NetSec]

An overview and Cryptographic Challenges of RSA Bhawana

PI - Internet Protocols

Academic Course Description

Novel Approach Design of Elliptic curve Cryptography Implementation in VLSI

Elliptic Curve Cryptosystem

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

Public Key Algorithms

Topics. Number Theory Review. Public Key Cryptography

Lecture 6: Overview of Public-Key Cryptography and RSA

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security

Prime Field over Elliptic Curve Cryptography for Secured Message Transaction

The Beta Cryptosystem

Introduction to Public-Key Cryptography

Lecture 2 Applied Cryptography (Part 2)

GCS - Cybersecurity Management

Cryptography and Network Security

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

Elliptic Curve Cryptography

ECE 297:11 Reconfigurable Architectures for Computer Security

G - Graphics

Introduction. Ahmet Burak Can Hacettepe University. Information Security

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC.

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Some Stuff About Crypto

Java Implementation And Arithmetic Performance Evaluation of Elliptic Curve Cryptography Using MATLAB

Introduction. Cambridge University Press Mathematics of Public Key Cryptography Steven D. Galbraith Excerpt More information

CAP - Advanced Programming Concepts

Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the

DSX - Digital Systems Using Embedded Linux

OVNET - Overlay Networks

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography

CS669 Network Security

10EC832: NETWORK SECURITY

XC2 - Computer Networks II

An effective Method for Attack RSA Strategy

Real-Time Programming and Database Systems

ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646

LECTURE 4: Cryptography

Analysis, demands, and properties of pseudorandom number generators

BD - Databases

Development of Applications Based in Microcontrollers

APNIC elearning: Cryptography Basics

RSA. Public Key CryptoSystem

A post-quantum proxy signature scheme based on rainbow digital signature

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:

Advanced Crypto. 2. Public key, private key and key exchange. Author: Prof Bill Buchanan

FXT - Foundations of Telematic Networks

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Timing Attack Prospect for RSA Cryptanalysts Using Genetic Algorithm Technique

EEC-484/584 Computer Networks

CCNA Security 1.1 Instructional Resource

IPNP - IP Networks and Protocols

Transcription:

Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 749 - MAT - Department of Mathematics Academic year: Degree: 2017 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus 2010). (Teaching unit Optional) ECTS credits: 6 Teaching languages: Catalan, Spanish Teaching staff Coordinator: Others: - Fernando Martínez Sáez (fernando.martinez@upc.edu) - Anna Rio Doval (ana.rio@upc.edu) - Jose Luis Ruiz Muñoz (jose.luis.ruiz@upc.edu) Degree competences to which the subject contributes Specific: CEC4.2. To demonstrate comprehension, to apply and manage the guarantee and security of computer systems. CTI2.3. To demonstrate comprehension, apply and manage the reliability and security of the computer systems (CEI C6). CTI3.1. To conceive systems, applications and services based on network technologies, taking into account Internet, web, electronic commerce, multimedia, interactive services and ubiquitous computation. CT1.2A. To interpret, select and value concepts, theories, uses and technological developments related to computer science and its application derived from the needed fundamentals of mathematics, statistics and physics. Capacity to solve the mathematical problems presented in engineering. Talent to apply the knowledge about: algebra, differential and integral calculus and numeric methods; statistics and optimization. CT1.2C. To use properly theories, procedures and tools in the professional development of the informatics engineering in all its fields (specification, design, implementation, deployment and products evaluation) demonstrating the comprehension of the adopted compromises in the design decisions. Generical: G9. PROPER THINKING HABITS: capacity of critical, logical and mathematical reasoning. Capacity to solve problems in her study area. Abstraction capacity: capacity to create and use models that reflect real situations. Capacity to design and perform simple experiments and analyse and interpret its results. Analysis, synthesis and evaluation capacity. Teaching methodology Lectures in which the contents of the subject will be exposed. Lab classes where students solve real situations that can be found in practice. Learning objectives of the subject 1.Distinguish between cryptosystems that can be safe and those that are snake oil. 2.Distinguish between public-key and secret-key cryptosystems 3.To understand the main ideas of secret-key cryptosystems. 4.To understand the main ideas of public-key cryptosystems 5. To understand the idea of digital signature and their role nowadays in internet. 1 / 9

Study load Total learning time: 156h Hours large group: 30h 19.23% Hours medium group: 0h 0.00% Hours small group: 30h 19.23% Guided activities: 6h 3.85% Self study: 90h 57.69% 2 / 9

Content Basic concepts Cryptology, Cryptography, and Cryptanalysis. Classic cryptography and modern cryptography. Basic techniques: encryption-decryption and signature. Private key cryptography and public key cryptography. The mathematical bases of cryptography. Modern secret key techniques Block encryption, Stream ciphers. Data Encryption Standard: Description, History, Standardisation, Cryptanalysis. Advanced Encryption Standard: Description, Standardisation. Operation modes for block-encrypted systems. Public key encryption Multi-precision arithmetic operations. Euclidean algorithms. Congruences, multiplication group, modular arithmetic, modular exponential, Chinese Remainder Theorem. Calculation of square roots. Prime numbers, probabilistic criteria of primeness, random generation of prime numbers. Factorising integers, current state of the problem. The discrete algorithm problem: variants over Finite Fields and elliptic curves. RSA cryptosystem (Rivest, Shamir, Adleman). ElGamal cryptosystem. Diffie-Hellman key exchange. Digital signatures Cryptographic hash functions. Secure Hash Standard. Digital signatures: RSA, DSA and ECDSA PKI: digital certificates X509, CRL and OCSP. Cryptographic protocols and standars 3 / 9

Encryption and decryption transformations. Mixed private key - public key techniques. Identification schemes and protocols. SSL. Micro-payments. Shared secrets. Electronic voting. Watermarks. SMIME. PKCS... New trens in Cryptography Lattice-Based Public-Key Cryptography. Hyperelliptic curve cryptography. Quantum Cryptography 4 / 9

Planning of activities Introduction Hours: 6h Theory classes: 2h Laboratory classes: 2h Self study: 2h 1, 2 secrect-key cryptography Hours: 22h Theory classes: 6h Laboratory classes: 4h Self study: 12h 1, 2, 3 Secrect-cryptography test Hours: 1h Guided activities: 1h Self study: 0h 1, 2, 3 public-key cryptography Hours: 50h Theory classes: 12h Laboratory classes: 8h Self study: 30h 1, 2, 4 Digital signature Hours: 8h Theory classes: 4h Laboratory classes: 0h Self study: 4h 5 / 9

5 Protocols and cryptographic standars Hours: 19h Theory classes: 3h Laboratory classes: 0h Self study: 16h 1 public-key test Hours: 1h Guided activities: 1h Self study: 0h 1, 2, 4, 5 New trends in cryptography Hours: 5h Theory classes: 1h Laboratory classes: 0h Self study: 4h 1, 2 edni Hours: 4h Laboratory classes: 1h Guided activities: 2h Self study: 1h 2, 5 6 / 9

secure email Hours: 5h Laboratory classes: 2h Guided activities: 2h Self study: 1h 1, 2, 3, 4, 5 Cryptographic hash functions Hours: 3h Laboratory classes: 1h Self study: 2h 5 AES Hours: 11h Laboratory classes: 5h Self study: 6h 1, 2, 3 Key distribution and digital signatures Hours: 10h Laboratory classes: 4h Self study: 6h 2, 3, 4, 5 7 / 9

Cryptographic system Hours: 1h Laboratory classes: 1h Self study: 0h 2, 3, 4, 5 Openssl/TLS Hours: 10h Laboratory classes: 2h Guided activities: 2h Self study: 6h 3, 4, 5 Qualification system 20 % Secrect-key test. 40 % Public-key test. 40 % Lab. 8 / 9

Bibliography Basic: Paar, C.; Pelzl, J. Understanding cryptography: a textbook for students and practitioners. Springer, 2010. ISBN 9783642041006. Hoffstein, J.; Pipher, J. C.; Silverman, J. H. An Introduction to mathematical cryptography. 2nd ed. New York: Springer, 2014. ISBN 9781493917105. Menezes, A.J.; Van Oorschot, P.C.; Vanstone, S.A. Handbook of applied cryptography. CRC Press, 1997. ISBN 0849385237. Mollin, R.A. RSA and public-key cryptography. Chapman & Hall/CRC, 2003. ISBN 1584883383. Pastor Franco, J.; Sarasa López, M.Á.; Salazar Riaño, J.L. Criptografía digital : fundamentos y aplicaciones. 2a ed. Publicaciones Universitarias Universidad de Zaragoza, 2001. ISBN 8477335583. Stallings, W. Cryptography and network security: principles and practice. 7th ed. Pearson, 2017. ISBN 9781292158587. Complementary: Anderson, R.J. Security engineering: a guide to building dependable distributed systems. 2nd ed. John Wiley & Sons, 2008. ISBN 9780470068526. Stinson, D.R. Cryptography: theory and practice. 3rd ed. Chapman & Hall / CRC, 2006. ISBN 1584885084. Salomaa, A. Public-key cryptography. Springer-Verlag, 1996. ISBN 9783642082542. Koblitz, N. A course in number theory and cryptography. 2nd e. Springer-Verlag, 1994. ISBN 0387942939. Blake, I. F; Seroussi, G.; Smart, N. Elliptic curves in cryptography. Cambridge University Press, 1999. ISBN 0521653746. Delfs, H.; Knebl, H. Introduction to cryptography: principles and applications. 2nd ed. Springer, 2007. ISBN 3540492437. Schneier, B. Applied cryptography: protocols, algorithms, and source code in C. 2nd ed. John Wiley & Sons, 1996. ISBN 0471117099. Yan, S.Y. Computational number theory and modern cryptography [on line]. John Wiley & Sons, 2013Available on: <http://onlinelibrary.wiley.com/book/10.1002/9781118188606>. ISBN 9781118188583. Daemen, J.; Rijmen, V. The design of Rijndael: AES the advanced encryption standard. Springer, 2001. ISBN 3540425802. Hankerson, D.; Menezes, A.; Vanstone, S. Guide to elliptic curve cryptography [on line]. Springer, 2004Available on: <http://link.springer.com/book/10.1007/b97644>. ISBN 038795273X. 9 / 9