Crypto Short Course

Christof Paar christof at ece.WPI.EDU
Wed Mar 7 10:10:03 PST 2001


I am offering again a 4 day short course in applied crypto. A brief
outline is below. For more info about the course contents and
registration, please see our web site at

 http://www.ece.wpi.edu/Research/crypt/courses/short_course.html

Regards,

Christof

! WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES 2001) !
!                  Paris, France, May 13-16, 2001                     !
!                       www.chesworkshop.org                          !

***********************************************************************
                 Christof Paar,  Assistant Professor
          Cryptography and Information Security (CRIS) Group
      ECE Dept., WPI, 100 Institute Rd., Worcester, MA 01609, USA
fon:(508) 831 5061  email: christof at ece.wpi.edu
fax:(508) 831 5491  www: http://www.ece.wpi.edu/People/faculty/cxp.html
***********************************************************************


          Worcester Polytechnic Institute
                 4-Day Short Course
                April  16,17 & 26,27
               WPI Southborough Campus

        APPLIED CRYPTOGRAPHY AND DATA SECURITY

          Seminar Leader: Dr. Christof Paar


      COMPLETE COURSE INFORMATION AND REGISTRATION:
 www.ece.wpi.edu/Research/crypt/courses/short_course.html


                  COURSE OUTLINE

Day 1, AM - Introduction to Cryptography and Data Security

Overview. Private-Key Cryptosystems. Cryptanalysis.


Day 1, PM - Stream Ciphers

Random Number Generators. Synchronous Stream Ciphers and LFSRs.  Attacks.
One Time Pad. Unconditional and Computational Security.


Day 2, AM - Block Ciphers: DES and AES

DES Functionality and History; Implementation: Hardware and Software;
Attacks and Security Estimations. AES: Functionality and History; Hardware
and Software Implementations. Other block ciphers. Key length and security.


Day 2, PM - Modes and Variants of Block Ciphers

Operation modes of block ciphers. Multiple encryption. Key whitening.


Day 3, AM - Public-key Cryptography

Principle. Some Number Theory. Overview of Practical
Schemes. Public-Key standards (ANSI, IEEE).


Day 3, PM - Public-key Algorithms

RSA Cryptosystem: Functionality, implementational aspects, recent attacks
and security estimations. Diffie-Hellman key exchange. Elliptic curve
cryptosystems: principle, practical and security aspects.


Day 4, AM - Digital Signatures and Protocols

Digital Signatures. Authentication Codes (MACs). Hash Functions. Protocols
for Privacy, Authentication, Integrity, Non-Repudiation.
Challenge-and-response protocols.


Day 4, PM - Key Distribution and Case Study

Key Distribution: Private-key approaches, public-Key approaches.
Certificates. Key Derivation. Case Study: Secure Socket Layer Protocol.



For help on using this list (especially unsubscribing), send a message to
"dcsb-request at reservoir.com" with one line of text: "help".

--- end forwarded text


-- 
-----------------
R. A. Hettinga <mailto: rah at ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





More information about the cypherpunks-legacy mailing list