1998-12-23 - Advanced Crypto Graduate Course

Header Data

From: Robert Hettinga <rah@shipwright.com>
To: cypherpunks@cyberpass.net
Message Hash: 30c93002e2e9fd137234c2a4145ab0482fd70b17e9edfa4c6d3a4ce476539baa
Message ID: <v04020a0eb2a6022dc81f@[139.167.130.246]>
Reply To: N/A
UTC Datetime: 1998-12-23 02:37:02 UTC
Raw Date: Wed, 23 Dec 1998 10:37:02 +0800

Raw message

From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 23 Dec 1998 10:37:02 +0800
To: cypherpunks@cyberpass.net
Subject: Advanced Crypto Graduate Course
Message-ID: <v04020a0eb2a6022dc81f@[139.167.130.246]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Tue, 22 Dec 1998 20:00:31 -0500 (EST)
From: Christof Paar <christof@ece.WPI.EDU>
To: "WPI.Crypto.Seminar":;
cc: DCSB <dcsb@ai.mit.edu>
Subject: Advanced Crypto Graduate Course
Sender: bounce-dcsb@ai.mit.edu
Reply-To: Christof Paar <christof@ece.WPI.EDU>

Please find below an announcement for the Crypto II graduate course. I'll
be happy to answer any question about the course contents. For
registration questions, please contact WPI's Graduate Admission Office at
"gao@wpi.edu".

Regards,

Christof

***********************************************************************
                 Christof Paar,  Assistant Professor
          Cryptography and Information Security (CRIS) Group
      ECE Dept., WPI, 100 Institute Rd., Worcester, MA 01609, USA
fon: (508) 831 5061    email: christof@ece.wpi.edu
fax: (508) 831 5491    www:   http://ee.wpi.edu/People/faculty/cxp.html
***********************************************************************

>>>  WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES) <<<
>>>                   WPI, August 12 & 13, 1999                     <<<
>>>         check  http://ece.wpi.edu/Research/crypt/ches           <<<


------------------------------------------------------------------------
           EE 579R, ADVANCED TOPICS IN CRYPTOGRAPHY

                       Spring `99 Semester
               WPI, Thursdays, 5:30-8:30pm, AK219
                 First day of class: January 21


                       COURSE DESCRIPTION

The course is a continuation of EE 578/CS 578, Cryptography and Data
Security. It will provide a deeper insight into several areas of cryptology
which are of great practical and theoretical importance. One focus of the
course is on techniques for efficient software and (to a somewhat lesser
extend) hardware implementations for public-key algorithms. The second focus
is on attacks against public-key schemes, which is fundamental for an
in-depth understanding of the choice of practical algorithms. Many techniques
will be introduced which are usually only treated in the research
literature.


                           SYLLABUS

Week 1: Introduction
Overview on practical public-key algorithms and efficient implementation
techniques. Efficient implementation of RSA: The Chinese Remainder Theorem.

Week 2: Selected public-key algorithms
Review of the generalized discrete logarithm problem and elliptic curve
cryptosystems.

Week 3: Efficient Implementation
Introduction to long number arithmetic.

Week 4: Efficient Implementation
Fast modular reduction algorithms.

Week 5: Efficient Implementation
Fast inversion algorithms.

Week 6: Efficient Implementation
Efficient exponentiation algorithms.

Week 7
Midterm Exam

Week 8: Attacks
Attacking DL systems: Baby-step giant-step method and Pollard's rho
method.

Week 9: Attacks
Attacking DL systems: Parallelization of Pollard's rho method.

Week 10
Topics TBA, depending on student interest. Possibilities are: Index-calculus
attack, differential cryptanalysis, correlation attacks, modern block cipher
design, Galois field arithmetic.

Week 11
as week 10 lecture

Week 12: Student presentations

Week 13: Student presentations

Week 14
Final Exam.


                           TEXTBOOKS

A. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied Cryptography. CRC
Press. (primary, mandatory)

D. Stinson, Cryptography: Theory and Practice. CRC Press, 1995. (recommended)



                        PREREQUISITES

The knowledge of the material of  EE 578/CS 578, Cryptography and Data
Security, is assumed (in particular with respect to public-key algorithms).
In addition, some experience with the C programming language is required.



***********************************************************************
                 Christof Paar,  Assistant Professor
          Cryptography and Information Security (CRIS) Group
      ECE Dept., WPI, 100 Institute Rd., Worcester, MA 01609, USA
fon: (508) 831 5061    email: christof@ece.wpi.edu
fax: (508) 831 5491    www:   http://ee.wpi.edu/People/faculty/cxp.html
***********************************************************************

>>>  WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES) <<<
>>>                   WPI, August 12 & 13, 1999                     <<<
>>>         check  http://ece.wpi.edu/Research/crypt/ches           <<<




For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





Thread