From: Robert Hettinga <rah@shipwright.com>
To: cypherpunks@cyberpass.net
Message Hash: 30c93002e2e9fd137234c2a4145ab0482fd70b17e9edfa4c6d3a4ce476539baa
Message ID: <v04020a0eb2a6022dc81f@[139.167.130.246]>
Reply To: N/A
UTC Datetime: 1998-12-23 02:37:02 UTC
Raw Date: Wed, 23 Dec 1998 10:37:02 +0800
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 23 Dec 1998 10:37:02 +0800
To: cypherpunks@cyberpass.net
Subject: Advanced Crypto Graduate Course
Message-ID: <v04020a0eb2a6022dc81f@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain
--- begin forwarded text
Date: Tue, 22 Dec 1998 20:00:31 -0500 (EST)
From: Christof Paar <christof@ece.WPI.EDU>
To: "WPI.Crypto.Seminar":;
cc: DCSB <dcsb@ai.mit.edu>
Subject: Advanced Crypto Graduate Course
Sender: bounce-dcsb@ai.mit.edu
Reply-To: Christof Paar <christof@ece.WPI.EDU>
Please find below an announcement for the Crypto II graduate course. I'll
be happy to answer any question about the course contents. For
registration questions, please contact WPI's Graduate Admission Office at
"gao@wpi.edu".
Regards,
Christof
***********************************************************************
Christof Paar, Assistant Professor
Cryptography and Information Security (CRIS) Group
ECE Dept., WPI, 100 Institute Rd., Worcester, MA 01609, USA
fon: (508) 831 5061 email: christof@ece.wpi.edu
fax: (508) 831 5491 www: http://ee.wpi.edu/People/faculty/cxp.html
***********************************************************************
>>> WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES) <<<
>>> WPI, August 12 & 13, 1999 <<<
>>> check http://ece.wpi.edu/Research/crypt/ches <<<
------------------------------------------------------------------------
EE 579R, ADVANCED TOPICS IN CRYPTOGRAPHY
Spring `99 Semester
WPI, Thursdays, 5:30-8:30pm, AK219
First day of class: January 21
COURSE DESCRIPTION
The course is a continuation of EE 578/CS 578, Cryptography and Data
Security. It will provide a deeper insight into several areas of cryptology
which are of great practical and theoretical importance. One focus of the
course is on techniques for efficient software and (to a somewhat lesser
extend) hardware implementations for public-key algorithms. The second focus
is on attacks against public-key schemes, which is fundamental for an
in-depth understanding of the choice of practical algorithms. Many techniques
will be introduced which are usually only treated in the research
literature.
SYLLABUS
Week 1: Introduction
Overview on practical public-key algorithms and efficient implementation
techniques. Efficient implementation of RSA: The Chinese Remainder Theorem.
Week 2: Selected public-key algorithms
Review of the generalized discrete logarithm problem and elliptic curve
cryptosystems.
Week 3: Efficient Implementation
Introduction to long number arithmetic.
Week 4: Efficient Implementation
Fast modular reduction algorithms.
Week 5: Efficient Implementation
Fast inversion algorithms.
Week 6: Efficient Implementation
Efficient exponentiation algorithms.
Week 7
Midterm Exam
Week 8: Attacks
Attacking DL systems: Baby-step giant-step method and Pollard's rho
method.
Week 9: Attacks
Attacking DL systems: Parallelization of Pollard's rho method.
Week 10
Topics TBA, depending on student interest. Possibilities are: Index-calculus
attack, differential cryptanalysis, correlation attacks, modern block cipher
design, Galois field arithmetic.
Week 11
as week 10 lecture
Week 12: Student presentations
Week 13: Student presentations
Week 14
Final Exam.
TEXTBOOKS
A. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied Cryptography. CRC
Press. (primary, mandatory)
D. Stinson, Cryptography: Theory and Practice. CRC Press, 1995. (recommended)
PREREQUISITES
The knowledge of the material of EE 578/CS 578, Cryptography and Data
Security, is assumed (in particular with respect to public-key algorithms).
In addition, some experience with the C programming language is required.
***********************************************************************
Christof Paar, Assistant Professor
Cryptography and Information Security (CRIS) Group
ECE Dept., WPI, 100 Institute Rd., Worcester, MA 01609, USA
fon: (508) 831 5061 email: christof@ece.wpi.edu
fax: (508) 831 5491 www: http://ee.wpi.edu/People/faculty/cxp.html
***********************************************************************
>>> WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES) <<<
>>> WPI, August 12 & 13, 1999 <<<
>>> check http://ece.wpi.edu/Research/crypt/ches <<<
For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".
--- end forwarded text
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Return to December 1998
Return to “Robert Hettinga <rah@shipwright.com>”
1998-12-23 (Wed, 23 Dec 1998 10:37:02 +0800) - Advanced Crypto Graduate Course - Robert Hettinga <rah@shipwright.com>