Course Catalogue Description:  

Historical development of cryptography, introduction to simple crypto systems, information theoretic security, basics of symmetric ciphers: block ciphers and stream ciphers, basics of asymmetric ciphers, cryptographic protocols and cryptanalysis.

 

Course Objectives: The aim of this course is to give the fundamental concepts of cryptography and introduce to students the classical secret-key and public key cryptographic systems. The course also serves as an introduction for students who are interested in pursuing research in cryptography.

 

Course Learning Outcomes: This is one of the core courses of the Cryptography Program at IAM, which gives the fundamentals of cryptography, the classical secret-key and public-key cryptographic systems, and also cryptanalysis. After taking the course, the students will able to know the fundamentals of cryptography.

 

Weekly Outline/Tentative Course Schedule:

(Weeks 1-4)

·       Historical development of Cryptography

·       Simple Crypto Systems: Monographic-Polygraphic Systems, Monoalphabetic-Polyalphabetic Systems, Substitution Ciphers, Transposition Ciphers, Frequency Analysis, Kasiski Analysis

 (Weeks 5-6)

·       Information Security, Entropy, Information Theory, Shannon’s Theory, Probability, Birthday paradox, Bias Theorem and Hash Function

(Weeks 7-11)

·       Block Ciphers: Diffusion, Confusion, Feistel Structure, Boolean Functions, and Nonlinearity

·       Stream Ciphers:  Shift Registers, Linear Complexity, RNG, One Time Pad

·       The idea of Public Key Cryptography

(Weeks 12-14)

·       Cryptographic Protocols: Zero-Knowledge Protocols, Commitment Scheme, Threshold Cryptosystem, and Oblivious Transfer.

·       Public Key Infrastructure

 

Required Textbook/s & Readings:

·       W. Trappe, L. Washington, Introduction to Cryptography, Pearson, 2006.

·       N. Koblitz, A Course in Number Theory and Cryptography, 2nd ed., Springer-Verlag (1994).

·       Douglas Stinson: Cryptography: Theory and Practice. CRC Press, Inc, 1996.

·       B. Beckett, Introduction to Cryptology and PC security, McGraw-Hill Pub. New York, 1997

·       J. A. Buchmann, Introduction to Cryptography, Springer-Verlag, New York, 2000.

·       Nigel Smart, Cryptography: An Introduction, Mcgraw-Hill Publication, Dec. 2004.

 

Supplementary Readings/Resources/E-Resources (if any):

·       Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography. CRC Press, 1996.

·       Eli Biham, Ahi Shamir: Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag, 1993.

·       B. Schneier, Applied Cryptography,2 nd edition, John Wiley and Sons, Inc, New York, 1996.

·       H.C.A, van Tilborg, Fundamentals of Cryptography, Kluwer Academic Publisher, Boston, 2000.