1996-08-10 - cryptography course at WPI

Header Data

From: Robert Hettinga <rah@shipwright.com>
To: cypherpunks@toad.com
Message Hash: 0f2e853542439cfc3d760031f145e66d124078e35f3f6a764e6addd9dd2c747a
Message ID: <v03007802ae322a849e00@[206.119.69.46]>
Reply To: N/A
UTC Datetime: 1996-08-10 15:23:33 UTC
Raw Date: Sat, 10 Aug 1996 23:23:33 +0800

Raw message

From: Robert Hettinga <rah@shipwright.com>
Date: Sat, 10 Aug 1996 23:23:33 +0800
To: cypherpunks@toad.com
Subject: cryptography course at WPI
Message-ID: <v03007802ae322a849e00@[206.119.69.46]>
MIME-Version: 1.0
Content-Type: text/plain



--- begin forwarded text


Date: Fri, 9 Aug 1996 19:19:10 -0400 (EDT)
From: Christof Paar <christof@ece.wpi.edu>
To: dcsb@ai.mit.edu
Subject: cryptography course at WPI
Mime-Version: 1.0
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Christof Paar <christof@ece.wpi.edu>
Status: U

(I hope this mail is appropriate for this mailing list :)

This announcment is probably mainly of interest to people in the greater
Boston area.  I will offer a graduate course in crypto and data security in
the fall at Worcester Polytechnic Institute.  The focus group are on-campus
students as well as people in industry.  Last year, I taught exactly the same
course in industry and it was a big success.  I am sure that it serves
industry needs very well.

I will be gone for one week but promise to answer all questions about the
course immediately when I return.

Regards,

Christof Paar



PS: There will be an advanced crypto course in the spring.


________________________________________________
Christof Paar
Assistant Professor
ECE Department
Worcester Polytechnic Institute
100 Institute Road
Worcester, MA 01609
email: christof@ece.wpi.edu
www:   http://ee.wpi.edu/People/faculty/cxp.html
tel:   (508) 831 5061
fax:   (508) 831 5491



============================================================================

                               WPI

           EE 578/CS 578: CRYPTOGRAPHY AND DATA SECURITY

                     Fall '96, Monday, 5:30-8:15 pm


                           INTRODUCTION

It is well known that we are in the midst of a shift towards an information
society. The upcoming generation of digital information systems will provide
services such as:

  -  wireless LAN and WAN computer networks

  -  multi-media services (e.g., high quality video-on-demand)

  -  smart cards (e.g., for network identification of electronic purse)

  -  electronic banking/digital commerce

These and other new information-based applications will have far reaching
consequences. As this happens, security aspects of communication systems are
of growing commercial and public interest. Unfortunately, these aspects have
been widely underestimated or ignored in the past. Today, however, there is
high demand for expertise and high quality products in the field of
information security and cryptography.

WPI's graduate course EE 578/CS 578 provides a solid and broad foundation in
the area of cryptography and data security. After taking the course students
should have an overview of state-of-the-art cryptography. In industry, they
should be able to carefully choose and design a security scheme for a given
application. The course also serves as an introduction for students who are
interested in pursuing research in cryptography. There are several
opportunities for Master's and PhD theses in the field of cryptography.



                     COURSE DESCRIPTION

This course gives a comprehensive introduction into the field of
cryptography and data security. We begin with the introduction of the
concepts of data security. Different attacks on cryptographic systems are
classified. Some pseudo-random generators are introduced. The concepts of
public and private key cryptography is developed. As important
representatives for secret key schemes, DES, IDEA, and other private key
algorithms are described. The public key schemes RSA, ElGamal, and elliptic
curve crypto systems are developed. As important tools for authentication
and integrity, digital signatures and hash functions are introduced.
Advanced protocols for key distribution in networks are developed.
Identification schemes are treated as advanced topics.  Some mathematical
algorithms for attacking cryptographic schemes are discussed. Application
examples will include a protocol for security in a LAN and identification
with smart cards. Special consideration will be given to schemes which are
relevant for network environments.  For all schemes, implementation aspects
and up-to-date security estimations will be discussed.



                        PREREQUISITES

Working knowledge of ``C''. An interest in discrete mathematics and
algorithms is highly desirable.


                           TEXTBOOK

D.R. Stinson, Cryptography: Theory and Practice. CRC Press, 1995



                     SYLLABUS EE 578/CS 578

An important part of the course is an independent project. The project topic
can freely be chosen by the student. Possible topics include (but are not
limited to) implementation of a real-size cryptographic algorithm or
protocol, a literature study on new cryptographic schemes or on legal
aspects of cryptography, or implementation of an algorithm for attacking a
cryptographic scheme.


WEEK 1:
Introduction: Principals of cryptography. Classical algorithms.
Attacks on cryptographic systems.

WEEK 2:
Stream ciphers and pseudo-random generators. Some information theoretical
results on cryptography.

WEEK 3:
Private key cryptography: The Data Encryption Standard DES. Brief history,
function and performance.

WEEK 4:
Private key cryptography: Recent results on successful attacks on DES.
Operation modes of symmetric ciphers. IDEA and other alternatives to DES.

WEEK 5:
Public key cryptography: Introduction. Some Number Theory and Algebra.

WEEK 6:
Public key cryptography: RSA. Function and security. Recent results on
successful attacks on RSA.

WEEK 7:
Midterm exam.

WEEK 8:
Public key cryptography: The discrete logarithm problem. ElGamal crypto
system. Function and security. Security estimations.

WEEK 9:
Public key cryptography: Elliptic curve systems. Mathematical background,
function and security.

WEEK 10:
Digital Signatures: The ElGamal signature scheme. Message Authentication
Codes (MAC).

WEEK 11:
Hash functions: Principals. Block cipher based hash functions.
Protocols: Attacks against protocols, protocols for privacy,
authentication, and integrity.

WEEK 12:
Key distribution in networks: Private key approaches, certificates, and
authenticated key agreement.

WEEK 13:
Identification schemes: Challenge-and-response protocols. The Schnorr
identification scheme for smart cards.

WEEK 14:
Final exam.



******************************************************************************
Christof Paar                        http://ee.wpi.edu/People/faculty/cxp.html
Assistant Professor                  email:  christof@ece.wpi.edu
ECE Department                       phone:  (508) 831 5061
Worcester Polytechnic Institute      fax:    (508) 831 5491
100 Institute Road
Worcester, MA 01609, USA
******************************************************************************




~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To unsubscribe from this list, send a letter to: Majordomo@ai.mit.edu
In the body of the message, write:  unsubscribe dcsb
Or, to subscribe,           write:  subscribe dcsb
If you have questions, write to me at Owner-DCSB@ai.mit.edu

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com)
e$, 44 Farquhar Street, Boston, MA 02131 USA
"'Bart Bucks' are not legal tender."
                -- Punishment, 100 times on a chalkboard,
                       for Bart Simpson
The e$ Home Page: http://www.vmeng.com/rah/







Thread