I am offering again a 4 day short course in applied crypto. A brief outline is below. For more info about the course contents and registration, please see our web site at http://www.ece.wpi.edu/Research/crypt/courses/short_course.html Regards, Christof ! WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES 2001) ! ! Paris, France, May 13-16, 2001 ! ! www.chesworkshop.org ! *********************************************************************** Christof Paar, Assistant Professor Cryptography and Information Security (CRIS) Group ECE Dept., WPI, 100 Institute Rd., Worcester, MA 01609, USA fon:(508) 831 5061 email: christof@ece.wpi.edu fax:(508) 831 5491 www: http://www.ece.wpi.edu/People/faculty/cxp.html *********************************************************************** Worcester Polytechnic Institute 4-Day Short Course April 16,17 & 26,27 WPI Southborough Campus APPLIED CRYPTOGRAPHY AND DATA SECURITY Seminar Leader: Dr. Christof Paar COMPLETE COURSE INFORMATION AND REGISTRATION: www.ece.wpi.edu/Research/crypt/courses/short_course.html COURSE OUTLINE Day 1, AM - Introduction to Cryptography and Data Security Overview. Private-Key Cryptosystems. Cryptanalysis. Day 1, PM - Stream Ciphers Random Number Generators. Synchronous Stream Ciphers and LFSRs. Attacks. One Time Pad. Unconditional and Computational Security. Day 2, AM - Block Ciphers: DES and AES DES Functionality and History; Implementation: Hardware and Software; Attacks and Security Estimations. AES: Functionality and History; Hardware and Software Implementations. Other block ciphers. Key length and security. Day 2, PM - Modes and Variants of Block Ciphers Operation modes of block ciphers. Multiple encryption. Key whitening. Day 3, AM - Public-key Cryptography Principle. Some Number Theory. Overview of Practical Schemes. Public-Key standards (ANSI, IEEE). Day 3, PM - Public-key Algorithms RSA Cryptosystem: Functionality, implementational aspects, recent attacks and security estimations. Diffie-Hellman key exchange. Elliptic curve cryptosystems: principle, practical and security aspects. Day 4, AM - Digital Signatures and Protocols Digital Signatures. Authentication Codes (MACs). Hash Functions. Protocols for Privacy, Authentication, Integrity, Non-Repudiation. Challenge-and-response protocols. Day 4, PM - Key Distribution and Case Study Key Distribution: Private-key approaches, public-Key approaches. Certificates. Key Derivation. Case Study: Secure Socket Layer Protocol. For help on using this list (especially unsubscribing), send a message to "dcsb-request@reservoir.com" with one line of text: "help". --- end forwarded text -- ----------------- R. A. Hettinga <mailto: rah@ibuc.com> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'