Introduction to Cryptography
WARNING
Lecture notes are deprecated for ITC Will update with better notes soon.
ITC
Unit 1 Introduction
- Introduction, Security goals (CIA triad)
- Goals of cryptography, principles of modern cryptography
- Perfectly secret encryption, one time pad and Shannon’s theorem
- Cryptographic applications
Unit 2 Classic CryptoSystems
- Shift Ciphers, Affine Ciphers
- Polyalphabetical Cipher
- Substitution Ciphers, Transposition Ciphers
- Stream and block ciphers, Cryptanalysis
Unit 3 Symmetric Key Cryptography
- Integer and modular arithmetic, Extended Euclidean Algorithm
- Linear Congruence, Algebraic structures (Group, Rings, and Fields) ,Galois Field
- Modern Block Cipher and its components(D- Boxes and S-Boxes)
- Product ciphers, stream ciphers (FSR and LFSR)
- Attacks on stream and block ciphers
- DES
- AES, modes of operations
Unit 3 Mathematics for Asymmetric Key Cryptography
- Primes, primality testing, factorization
- Chinese remainder theorem, Quadratic Congruence
- Fermat’s little theorem, Euler’s theorem
Unit 5: Asymmetric Key Cryptography
Unit 6: Key Management
- Key Distribution Centre, Needham-Schroeder Protocol
- Kerberos, Diffie,-Hellman Key Agreement
- DiffieHellman’s Key exchange
- Certification Authority, Public-Key infrastructure
Unit 7: Hash Functions and Digital Signature
- Introduction To Hash Functions
- RSA Signatures
- Digital Signature Algorithm
- Birthday Attack on signatures
- Message Authentication Code