Foundations of Cryptography
Indian Institute of Technology Bangalore and NPTEL via Swayam
-
26
-
- Write review
Overview
INTENDED AUDIENCE :Computer science and Mathematics students
PREREQUISITES : There are no pre-requisites for this course. However it is expected that the students who are interested to take this course have had some exposure to a basic course on discrete mathematics, algorithms, or theory of computation. Having said that, I ensure that a significant effort will be made from my side to simplify the overall presentation of the course and make it easily accessible.INDUSTRY SUPPORT : The course will be relevant for any IT related company
Syllabus
COURSE LAYOUT
Week 1: Course Overview, Symmetric-key Encryption, Historical Ciphers, Perfect Security and Its LimitationsWeek2: Computational Security, Semantic Security and Pseudorandom Generators (PRGs)
Week 3: Stream Ciphers, Provably-secure Instantiation of PRG, Practical Instantiation of PRG, CPA-security and Pseudo-random Functions (PRFs)
Week4: CPA-Secure Ciphers from PRF, Modes of Operations of Block Ciphers, Theoretical Constructions of Block Ciphers and Practical Constructions of Block Ciphers
Week5: DES, AES and Message Authentication Codes (MAC)
Week6: Information-theoretic Secure MAC, Cryptographic Hash Functions, Ideal-Cipher Model, Davies-Meyer construction and Merkle-Damgård Paradigm
Week7: Birthday Attacks on Cryptographic Hash Functions, Applications of Hash Functions, Random Oracle Model and Authenticated Encryption
Week 8: Generic Constructions of Authenticated Encryption Schemes, Key-exchange Problem, One-way Trapdoor Functions and Cyclic Groups
Week9: Discrete-Logarithm Problem, Computational Diffie-Hellman Problem, Decisional Diffie-Hellman Problem, Elliptic-Curve Based Cryptography and Public-Key Encryption
Week10:El Gamal Encryption Scheme, RSA Assumption, RSA Public-key Cryptosystem, KEM-DEM Paradigm and CCA-security in the Public-key Domain
Week11: CCA-secure Public-key Hybrid Ciphers Based on Diffie-Hellman Problems and RSA-assumption, Digital Signatures, RSA Signatures and Schnorr Identification Scheme
Week 12:Schnorr Signature, Overview of TLS/SSL, Number Theory, Interactive Protocols and Farewell
Taught by
Prof. Ashish Choudhury
Related Courses
-
Cryptography and Network Security
Indian Institute of Technology, Kharagpur, NPTEL
-
Asymmetric Cryptography and Key Management
University of Colorado System
-
Cryptography I
Stanford University
4.7 -
Cryptographic Hash and Integrity Protection
University of Colorado System
-
Applied Cryptography
University of Virginia
4.2 -
Basic Cryptography and Programming with Crypto API
University of Colorado System
Reviews
0.0 rating, based on 0 reviews