Advanced Crypto Graduate Course

Robert Hettinga rah at shipwright.com
Tue Dec 22 18:37:02 PST 1998




--- begin forwarded text


Date: Tue, 22 Dec 1998 20:00:31 -0500 (EST)
From: Christof Paar <christof at ece.WPI.EDU>
To: "WPI.Crypto.Seminar":;
cc: DCSB <dcsb at ai.mit.edu>
Subject: Advanced Crypto Graduate Course
Sender: bounce-dcsb at ai.mit.edu
Reply-To: Christof Paar <christof at ece.WPI.EDU>

Please find below an announcement for the Crypto II graduate course. I'll
be happy to answer any question about the course contents. For
registration questions, please contact WPI's Graduate Admission Office at
"gao at wpi.edu".

Regards,

Christof

***********************************************************************
                 Christof Paar,  Assistant Professor
          Cryptography and Information Security (CRIS) Group
      ECE Dept., WPI, 100 Institute Rd., Worcester, MA 01609, USA
fon: (508) 831 5061    email: christof at ece.wpi.edu
fax: (508) 831 5491    www:   http://ee.wpi.edu/People/faculty/cxp.html
***********************************************************************

>>>  WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES) <<<
>>>                   WPI, August 12 & 13, 1999                     <<<
>>>         check  http://ece.wpi.edu/Research/crypt/ches           <<<


------------------------------------------------------------------------
           EE 579R, ADVANCED TOPICS IN CRYPTOGRAPHY

                       Spring `99 Semester
               WPI, Thursdays, 5:30-8:30pm, AK219
                 First day of class: January 21


                       COURSE DESCRIPTION

The course is a continuation of EE 578/CS 578, Cryptography and Data
Security. It will provide a deeper insight into several areas of cryptology
which are of great practical and theoretical importance. One focus of the
course is on techniques for efficient software and (to a somewhat lesser
extend) hardware implementations for public-key algorithms. The second focus
is on attacks against public-key schemes, which is fundamental for an
in-depth understanding of the choice of practical algorithms. Many techniques
will be introduced which are usually only treated in the research
literature.


                           SYLLABUS

Week 1: Introduction
Overview on practical public-key algorithms and efficient implementation
techniques. Efficient implementation of RSA: The Chinese Remainder Theorem.

Week 2: Selected public-key algorithms
Review of the generalized discrete logarithm problem and elliptic curve
cryptosystems.

Week 3: Efficient Implementation
Introduction to long number arithmetic.

Week 4: Efficient Implementation
Fast modular reduction algorithms.

Week 5: Efficient Implementation
Fast inversion algorithms.

Week 6: Efficient Implementation
Efficient exponentiation algorithms.

Week 7
Midterm Exam

Week 8: Attacks
Attacking DL systems: Baby-step giant-step method and Pollard's rho
method.

Week 9: Attacks
Attacking DL systems: Parallelization of Pollard's rho method.

Week 10
Topics TBA, depending on student interest. Possibilities are: Index-calculus
attack, differential cryptanalysis, correlation attacks, modern block cipher
design, Galois field arithmetic.

Week 11
as week 10 lecture

Week 12: Student presentations

Week 13: Student presentations

Week 14
Final Exam.


                           TEXTBOOKS

A. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied Cryptography. CRC
Press. (primary, mandatory)

D. Stinson, Cryptography: Theory and Practice. CRC Press, 1995. (recommended)



                        PREREQUISITES

The knowledge of the material of  EE 578/CS 578, Cryptography and Data
Security, is assumed (in particular with respect to public-key algorithms).
In addition, some experience with the C programming language is required.



***********************************************************************
                 Christof Paar,  Assistant Professor
          Cryptography and Information Security (CRIS) Group
      ECE Dept., WPI, 100 Institute Rd., Worcester, MA 01609, USA
fon: (508) 831 5061    email: christof at ece.wpi.edu
fax: (508) 831 5491    www:   http://ee.wpi.edu/People/faculty/cxp.html
***********************************************************************

>>>  WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES) <<<
>>>                   WPI, August 12 & 13, 1999                     <<<
>>>         check  http://ece.wpi.edu/Research/crypt/ches           <<<




For help on using this list (especially unsubscribing), send a message to
"dcsb-request at ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah at philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'






More information about the cypherpunks-legacy mailing list