Cryptography Short Course

Robert Hettinga rah at shipwright.com
Thu May 8 19:47:34 PDT 1997



--- begin forwarded text


Date: Thu, 8 May 1997 22:09:58 -0400 (EDT)
From: Christof Paar <christof at ece.WPI.EDU>
To: DCSB <dcsb at ai.mit.edu>
cc: Arlene Lowenstein <arlowenstein at jake.WPI.EDU>
Subject: Cryptography Short Course
MIME-Version: 1.0
Sender: bounce-dcsb at ai.mit.edu
Precedence: bulk
Reply-To: Christof Paar <christof at ece.WPI.EDU>


WPI's Continuing Education Program is offering a 5-day short course in
cryptography. I will be teaching the course from August 4-8, in Waltham.
Waltham is 10 miles West of Boston.

Please find below a detailed course description and a registration form.

If you have any question about course contents etc., please feel free to
contact me by email.

For questions regarding registration, contact Arlene Lowenstein at:
arlowenstein at jake.wpi.edu

Best regards,

Christof

*************************************************************************
Christof Paar                   http://ee.wpi.edu/People/faculty/cxp.html
Assistant Professor             email:  christof at ece.wpi.edu
Cryptography Group              phone:  (508) 831 5061
ECE Department, WPI             fax:    (508) 831 5491
100 Institute Road
Worcester, MA 01609, USA
*************************************************************************



-----------------------------------------------------------------------
           Worcester Polytechnic Institute
                 5-Day Short Course

        APPLIED CRYPTOGRAPHY AND DATA SECURITY

          Seminar Leader: Dr. Christof Paar


Many of today's information technology applications have data security
as a central system requirement. Applications such as wireless computer
networks, electronic commerce, and many www applications rely heavily
on a high degree of system security.

This five-day course will provide you with an in-depth introduction to
the field of applied cryptography. Virtually all important aspects of
public-key and private-key algorithms as well as protocols will be
introduced. The course keeps the theoretical background and technical
applications well-balanced. You will leave the course with a solid,
broad knowledge of state-of-the-arts cryptography. You will have skills
to carefully choose and design a security scheme for a given
application.

Background Note: The seminar is based on a highly successful course
which has been taught to more than 150 professionals in industry and
graduate students on campus.



                  COURSE OUTLINE

Day 1, AM - Introduction

Principles of cryptography. Classical algorithms. Attacks on
cryptographic systems.

Day 1, PM - Private-key algorithms

Stream ciphers. Pseudo-random generators. One-time pads.

Day 2, AM - Private-key algorithms

Data Encryption Standard (DES): Function, performance, implementation,
security. Overview on other modern block ciphers. Key length and
long-term security.

Day 2, PM - Usage of private key-algorithms

Operation modes of block ciphers. Multiple encryption. Key whitening.

Day 3, AM - Public-key cryptography

Introduction. One-way functions. Some number theory.

Day 3, PM - Public-key algorithms

RSA: Function, performance, implementation, security. Recent attacks.

Day 4, AM - Public-key algorithms

The generalized discrete logarithm problem. Diffie-Hellman key
exchange. ElGamal encryption. Elliptic curve cryptosystems.

Day 4, PM - Protocol building blocks

Digital Signatures. Hash Functions. Security Services: Privacy,
authentication, integrity, identification, non-repudiation.

Day 5, AM - Key distribution

Key distribution protocols. Principle of Kerberos. Certificates.
Trusted authorities.

Day 5, PM - Identification

Smart Cards. Principles of identification. Challenge-and-response
protocols. Course summary.


                  WHO SHOULD ATTEND

Engineers and other technical professional who develop, implement, or
assess information security applications in software or hardware.
Technical managers who need a solid understanding of data security
issues will also greatly benefit from the course.


                 ABOUT THE INSTRUCTOR

Dr. Christof Paar leads the Cryptography and Data Security group at WPI's
ECE Department. His research interests include security issues in wireless
and ATM networks, efficient algorithms for elliptic and hyperelliptic
curve systems, and hardware implementation of cryptosystems.


                 DATES AND LOCATIONS

August 4 - 8, 1997 in Waltham, MA (10 miles from Boston)


                  FEE

$1795 for first registration

$1625 for subsequent registrations


--------------------- print and cut here -----------------------------

           WPI CONTINUING EDUCATION REGISTRATION FORM

Please print out, complete, and return this form to

  Office of Continuing Education, WPI, Worcester, MA 01609-2280,
  call (508) 831-5517 or FAX this form to (508) 831-5694.

Make copies of this form for multiple registrations.


Title of Seminar: APPLIED CRYPTOGRAPHY AND DATA SECURITY

Date of Seminar: August 4-8, 1997, WPI Waltham Campus, Waltham, MA


Name (Mr.)(Ms.) ___________________________________________________

Title _____________________________________________________________

Organization ______________________________________________________

Business Address __________________________________________________

City _______________________________________

State ________ Zip _________________________

Business Phone  ____________________________

FAX  _____________________

Home Phone  ______________


Fee Enclosed (Make checks payable to WPI) ______

Bill my Company, P.O.# __________

Please charge my:     VISA   Mastercard   Discover

  Name on card ________________________________________________

  Exp. date _____________________

  Card # ______________________________________________________

  Signature ___________________________________________________




~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To unsubscribe from the dcsb list, send a letter to: Majordomo at ai.mit.edu
In the body of the message, write:  unsubscribe dcsb
Or, to subscribe,           write:  subscribe dcsb
If you have questions, write to me at Owner-DCSB at ai.mit.edu

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/








More information about the cypherpunks-legacy mailing list