From: Robert Hettinga <rah@shipwright.com>
To: cryptography@c2.net
Message Hash: 9bd5c25516cb13e11a742e768d4df1bd8a3f388e98d923f0daecdbb7ff487906
Message ID: <v0311071fb027cbf8fcc0@[139.167.130.248]>
Reply To: N/A
UTC Datetime: 1997-08-26 00:21:52 UTC
Raw Date: Tue, 26 Aug 1997 08:21:52 +0800
From: Robert Hettinga <rah@shipwright.com>
Date: Tue, 26 Aug 1997 08:21:52 +0800
To: cryptography@c2.net
Subject: Graduate Cryptography Course at WPI
Message-ID: <v0311071fb027cbf8fcc0@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain
--- begin forwarded text
X-Authentication-Warning: goya.WPI.EDU: christof owned process doing -bs
Date: Mon, 25 Aug 1997 17:21:25 -0400 (EDT)
From: Christof Paar <christof@ece.WPI.EDU>
To: DCSB <dcsb@ai.mit.edu>
cc: Lisa Jernberg <jernberg@wpi.wpi.edu>
Subject: Graduate Cryptography Course at WPI
MIME-Version: 1.0
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Christof Paar <christof@ece.WPI.EDU>
This is an announcement for my graduate course in cryptography. Detailed
information is included below. Please note that (i) the course is offered
on Tuesday nights this semester and (ii) that it is cross-listed as CS 578.
The course has been taught to almost 200 people in industry and graduate
students over the last few years. Industry participants include engineers
from GTE Government Systems, RSA, Philips Research, DEC, HP, Bay Networks,
and others.
For questions about registrations, please contact Lisa Jernberg at
jernberg@wpi.wpi.edu
Please feel free to contact me if there are any further questions about
the class.
Best regards,
Christof Paar
*************************************************************************
Christof Paar http://ee.wpi.edu/People/faculty/cxp.html
Assistant Professor email: christof@ece.wpi.edu
Cryptography Group phone: (508) 831 5061
ECE Department, WPI fax: (508) 831 5491
100 Institute Road
Worcester, MA 01609, USA
*************************************************************************
****************************************************************************
Worcester Polytechnic Institute
EE 578/CS 578: CRYPTOGRAPHY AND DATA SECURITY
Fall '97, Tuesday, 5:30-8:30 pm, AK 233
Starting date: September 9, 1997
INTRODUCTION
It is well known that we are in the midst of a shift towards an information
society. The upcoming generation of digital information systems will provide
services such as:
- wireless LAN and WAN computer networks
- multi-media services (e.g., high quality video-on-demand)
- smart cards (e.g., for network identification of electronic purse)
- electronic banking/digital commerce
These and other new information-based applications will have far reaching
consequences. As this happens, security aspects of communication systems are
of growing commercial and public interest. Unfortunately, these aspects have
been widely underestimated or ignored in the past. Today, however, there is
high demand for expertise and high quality products in the field of
information security and cryptography.
WPI's graduate course EE 578/CS 578 provides a solid and broad foundation in
the area of cryptography and data security. After taking the course students
should have an overview of state-of-the-art cryptography. In industry, they
should be able to carefully choose and design a security scheme for a given
application. The course also serves as an introduction for students who are
interested in pursuing research in cryptography. There are several
opportunities for Master's and PhD theses in the field of cryptography.
COURSE DESCRIPTION
This course gives a comprehensive introduction into the field of
cryptography and data security. We begin with the introduction of the
concepts of data security. Different attacks on cryptographic systems are
classified. Some pseudo-random generators are introduced. The concepts of
public and private key cryptography is developed. As important
representatives for secret key schemes, DES, IDEA, and other private key
algorithms are described. The public key schemes RSA, ElGamal, and elliptic
curve crypto systems are developed. As important tools for authentication
and integrity, digital signatures and hash functions are introduced.
Advanced protocols for key distribution in networks are developed.
Identification schemes are treated as advanced topics. Some mathematical
algorithms for attacking cryptographic schemes are discussed. Application
examples will include a protocol for security in a LAN and identification
with smart cards. Special consideration will be given to schemes which are
relevant for network environments. For all schemes, implementation aspects
and up-to-date security estimations will be discussed.
PREREQUISITES
Working knowledge of ``C''. An interest in discrete mathematics and
algorithms is highly desirable.
TEXTBOOK
D.R. Stinson, Cryptography: Theory and Practice. CRC Press, 1995
(mandatory)
B. Schneier, Applied Cryptography. 2nd edition, Wiley & Sons, 1996
(recommended for additional reading)
SYLLABUS EE 578/CS 578
An important part of the course is an independent project. The project topic
can freely be chosen by the student. Possible topics include (but are not
limited to) implementation of a real-size cryptographic algorithm or
protocol, a literature study on new cryptographic schemes or on legal
aspects of cryptography, or implementation of an algorithm for attacking a
cryptographic scheme.
WEEK 1:
Introduction: Principals of cryptography. Classical algorithms.
Attacks on cryptographic systems.
WEEK 2:
Stream ciphers and pseudo-random generators.. Some information theoretical
results on cryptography.
WEEK 3:
Private key cryptography: The Data Encryption Standard DES. Brief history,
function and performance.
WEEK 4:
Private key cryptography: Recent results on successful attacks on DES.
Operation modes of symmetric ciphers. IDEA and other alternatives to
DES.
WEEK 5:
Public key cryptography: Introduction. Some Number Theory and Algebra.
WEEK 6:
Public key cryptography: RSA. Function and security. Recent results on
successful attacks on RSA.
WEEK 7:
Midterm exam.
WEEK 8:
Public key cryptography: The discrete logarithm problem. ElGamal crypto
system. Function and security. Security estimations.
WEEK 9:
Public key cryptography: Elliptic curve systems. Mathematical background,
function and security.
WEEK 10:
Digital Signatures: The ElGamal signature scheme. Message Authentication
Codes (MAC).
WEEK 11:
Hash functions: Principals. Block cipher based hash functions.
Protocols: Attacks against protocols, protocols for privacy,
authentication, and integrity.
WEEK 12:
Key distribution in networks: Private key approaches, certificates, and
authenticated key agreement.
WEEK 13:
Identification schemes: Challenge-and-response protocols. The Schnorr
identification scheme for smart cards.
WEEK 14:
Final exam.
******************************************************************************
Christof Paar http://ee.wpi.edu/People/faculty/cxp.html
Assistant Professor email: christof@ece.wpi.edu
ECE Department phone: (508) 831 5061
Worcester Polytechnic Institute fax: (508) 831 5491
100 Institute Road
Worcester, MA 01609, USA
******************************************************************************
For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".
--- end forwarded text
-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Return to August 1997
Return to “Robert Hettinga <rah@shipwright.com>”
1997-08-26 (Tue, 26 Aug 1997 08:21:52 +0800) - Graduate Cryptography Course at WPI - Robert Hettinga <rah@shipwright.com>