CS-458: Introduction to Cryptography


Schedule

Lesson Subject Book chapter*
1 The Context of Cryptography
  • The role of cryptography
  • The weakest link property
  • The adversarial setting
  • Threat model
  • Security and other design criteria
1.1
2 Classical Cryptosystems I
  • Substitution ciphers
  • Transposition ciphers
  • Product ciphers
1.2
3 Classical Cryptosystems II
  • Substitution ciphers
  • Transposition ciphers
  • Product ciphers
1.2
4 Cryptographic Attacks
  • Security Architecture
  • Threats, attacks, mechanisms and services
  • Cryptographic attacks
  • COA, KPA, CPA, CCA, Distinguishing Attack, Brute Force
1.2.9
2.2.2
5 One Time Pad
  • Index of Coincidence
  • XOR Cipher
  • One Time Pad
2.1.3
slides
6 Block Ciphers I
  • Symmetric cryptography principles and algorithms
  • Data Encryption Standard (DES)
  • Tripe DES (3DES)
  • Lightweight ciphers
1.4
2.3
7 Block Ciphers II
  • Advances Encryption Standard (AES)
1.4
2.4
8 Block Ciphers III
  • Modes of Operation
  • Increasing the security of block ciphers
2.5
9 Block Ciphers IV
  • Attacks
slides
10 Introduction to Number Theory
  • Modular arithmetic
  • Euclidean and extended Euclidean algorithms
  • Euler's Phi Function
1.8
1.9
1.10
2.6
11 Public key cryptography I
  • Principles and applications
  • Symmetric vs. asymmetric cryptography
  • Practical aspects of public cryptography
  • Algorithms
2.6
12 Public key cryptography II
  • The RSA cryptosystem
  • RSA in practice
1.11
2.7
13 Public key cryptography III
  • Cryptosystems based on the Discrete Logarithm Problem
  • Elliptic Curve Cryptosystems
  • Digital signatures
1.13
2.8
2.9
2.10
14 Public key cryptography IV
  • Attacks
slides
15 Hash functions I
  • Principles and applications
  • Algorithms (SHA-1/2/3)
1.5
16 Hash functions II
  • Attacks
slides
17 Message Authentication Codes
  • Principles
  • MACs from hash functions
  • MACs from block ciphers
1.5
2.12
18 Key Establishment
  • Key freshness and key derivation
  • Key establishment using symmetric-key techniques
  • Key establishment using asymmetric techniques
1.6
2.13

Book chapters: The course lectures will follow both recommended textbooks, chapters beginning with 1 refer to the textbook "Εισαγωγή στην Κρυπτογραφία" whereas chapters begining with 2 refer to the textbook "Understanding Cryptography, a textbook for students and practitioners".