Crypto Short Course
Christof Paar
christof at ece.WPI.EDU
Wed Mar 7 10:10:03 PST 2001
I am offering again a 4 day short course in applied crypto. A brief
outline is below. For more info about the course contents and
registration, please see our web site at
http://www.ece.wpi.edu/Research/crypt/courses/short_course.html
Regards,
Christof
! WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES 2001) !
! Paris, France, May 13-16, 2001 !
! www.chesworkshop.org !
***********************************************************************
Christof Paar, Assistant Professor
Cryptography and Information Security (CRIS) Group
ECE Dept., WPI, 100 Institute Rd., Worcester, MA 01609, USA
fon:(508) 831 5061 email: christof at ece.wpi.edu
fax:(508) 831 5491 www: http://www.ece.wpi.edu/People/faculty/cxp.html
***********************************************************************
Worcester Polytechnic Institute
4-Day Short Course
April 16,17 & 26,27
WPI Southborough Campus
APPLIED CRYPTOGRAPHY AND DATA SECURITY
Seminar Leader: Dr. Christof Paar
COMPLETE COURSE INFORMATION AND REGISTRATION:
www.ece.wpi.edu/Research/crypt/courses/short_course.html
COURSE OUTLINE
Day 1, AM - Introduction to Cryptography and Data Security
Overview. Private-Key Cryptosystems. Cryptanalysis.
Day 1, PM - Stream Ciphers
Random Number Generators. Synchronous Stream Ciphers and LFSRs. Attacks.
One Time Pad. Unconditional and Computational Security.
Day 2, AM - Block Ciphers: DES and AES
DES Functionality and History; Implementation: Hardware and Software;
Attacks and Security Estimations. AES: Functionality and History; Hardware
and Software Implementations. Other block ciphers. Key length and security.
Day 2, PM - Modes and Variants of Block Ciphers
Operation modes of block ciphers. Multiple encryption. Key whitening.
Day 3, AM - Public-key Cryptography
Principle. Some Number Theory. Overview of Practical
Schemes. Public-Key standards (ANSI, IEEE).
Day 3, PM - Public-key Algorithms
RSA Cryptosystem: Functionality, implementational aspects, recent attacks
and security estimations. Diffie-Hellman key exchange. Elliptic curve
cryptosystems: principle, practical and security aspects.
Day 4, AM - Digital Signatures and Protocols
Digital Signatures. Authentication Codes (MACs). Hash Functions. Protocols
for Privacy, Authentication, Integrity, Non-Repudiation.
Challenge-and-response protocols.
Day 4, PM - Key Distribution and Case Study
Key Distribution: Private-key approaches, public-Key approaches.
Certificates. Key Derivation. Case Study: Secure Socket Layer Protocol.
For help on using this list (especially unsubscribing), send a message to
"dcsb-request at reservoir.com" with one line of text: "help".
--- end forwarded text
--
-----------------
R. A. Hettinga <mailto: rah at ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
More information about the Testlist
mailing list