Optional Courses

Cryptographic Algorithms and Protocols

Source:国际学院 Date:2020-12-02 Hits:30

Course Objectives:

This course covers the basic concepts in Cryptography, the basic cryptographic algorithms and protocols, including the classical cryptosystems, the block cryptosystems, the public-key cryptosystems, Hash functions, digital signature schemes. This course will provide students with a fundamental support for doing further academic research and engineering practice in Cryptography.

Course Requirements:

1. To master the basic concepts and related theorems in Number Theory, Algebra, Probability and Information Theory;

2. To grasp the basics of the cryptosystems and crypt-analysis;

3. To master some classical cryptosystems, such as the Affine Cipher, the Substitution Cipher, the Permutation Cipher and the Stream Cipher;

4. To master two block cryptosystems: the DES and AES;

5. To grasp the basics of Hash functions, the security and Random Oracle Model, the famous SHA algorithm;

6. To master the basics of the public-key cryptosystems, including:

a. The RSA encryption;

b. The ElGamal encryption;

c. The digital (RSA and ElGamal) Signature Schemes.

Course Contents:

1) Chapter 1-Classical Cryptography: The Shift Cipher, The Substitution Cipher, The Affine Cipher, The Permutation Cipher, Stream Ciphers;

2) Chapter 2-Shannon’s Theory: Elementary of Probability Theory and Entropy, Perfect Secrecy;

3) Chapter 3-Block Ciphers: Basics of the Substitution-Permutation Network, the Data Encryption Standard (DES), the Advanced Encryption Standard (AES);

4) Chapter 4-Hash Functions: Basics and Security of Hash Functions, Iterated Hash Functions and the Secure Hash Algorithm (SHA-1), the Message Authentication Code (MAC);

5) Chapter 5-The RSA Cryptosystem: Introduction to the Public-key Cryptography, The RSA Cryptosystem, Factoring Integers, Factoring Algorithms and other attacks on RSA, the Rabin Cryptosystem, Semantic Security of RSA;

6) Chapter 6-The ElGamal Cryptosystem: the Discrete Logarithm Problem (DLP) and Algorithms, Finite Field and Elliptic Curves, Security of ElGamal Systems;

7) Chapter 7-Signature Schemes: Basics of and Security Requirements for Signature Schemes, the RSA signature scheme, the ElGamal signature scheme, the Digital Signature Standard (DSS);

8) Some Research Topics in Cryptography.

 

Credits: 2