CSCI-462, Fall 2017

building 70, room 3657,

(585) 475-5193, spr@cs.rit.edu

http://www.cs.rit.edu/~spr

office hours:
MW 10am-11am, 7pm-8pm, or send email

college syllabus, general schedule. This page gives the current offering's contents and schedule.

- Christof Paar and Jan Pelzl,
*Understanding Cryptography,*SpringerLink, 2010

(**required textbook**). - Douglas R. Stinson,
*Cryptography: Theory and Practice,*CRC Press,

third edition 2006, Known errors for the second edition are posted. - Wade Trappe and Lawrence C. Washington,

*Introduction to Cryptography with Coding Theory,*Prentice Hall 2002, 2006. - A. J. Menezes, P. C. van Oorschot and S. A. Vanstone,
*CRC Handbook of Applied Cryptography,*CRC Press 1996/2001 (great addition to your bookshelf). -
Niels Ferguson, Bruce Schneier and Tadayoshi Kohno,
*Cryptography Engineering,*John Wiley & Sons 2010 (complementary reading.) -
William Stallings,
*Cryptography and Network Security. Principles and Practice,*Prentice Hall, fifth edition 2011 (popular textbook elsewhere.) - Bruce Schneier,
*Applied Cryptography,*John Wiley & Sons 1994 (popular textbook elsewhere.) - Paul Garrett,
*Making, Breaking Codes. An Introduction to Cryptology,*Prentice Hall 2001. - Richard A. Mollin,
*An Introduction to Cryptography,*Chapman & Hall/CRC 2001. - Simon Singh,
*The Code Book, the evolution of secrecy from Mary, Queen of Scots, to quantum cryptography,*Doubleday 1999. - Stefan Katzenbeisser and Fabien A.P. Petitcolas (editors),
*Information Hiding, techniques for steganography and digital watermarking,*Artech House 2000. - Cryptogram, electronic newsletter.
- Journal articles.

- 5% class participation
- 25% homeworks
- 20% third-term exam, Friday, October 6, 9:05am-10am, 70-1445
- 20% third-term exam, Monday, November 6, 9:05am-10am, 70-1445
- 30% final exam, Thursday, December 14, 2:45pm-4:45pm, 70-2400

The course is devoted to the review of basic cryptographic algorithms, their implementations and usage. Classical encryption techniques and those of Diffie-Hellman and Rivest-Shamir-Adleman will be seen in depth, and an overview of several others will be presented, especially those denominated as public-key cryptosystems. The symmetric systems DES and AES, and others, will be studied. The course also presents digital signatures, hash functions, authentication schemes and some interactive proof protocols.

The specific topics will include

- Introduction, need of security. History.
- Substitution and monoalphabetic ciphers.
- Vigenere cipher, coincidence index.
- A touch of number theoretical algorithms.
- Private key cryptography.
- Data Encryption Standard - DES.
- Rijndael, Advanced Encryption Standard - AES.
- Secure hashing algorithms - SHA-family, NIST competition.
- Public key cryptography. One-way functions.
- Rivest-Shamir-Adleman cryptosystem - RSA. RSA-xxx challenge.
- Overview of ElGamal cryptosystem, discrete logarithms, digital signatures.

- Your textbook website, or even better
- Class slides beyond the textbook: modtabs.txt, expgcd.pdf, prng.pdf, desplus.pdf, gf.pdf, crt.pdf, gen2251.pdf, oaep.pdf, AKS.pdf, primes.pdf, rho.pdf. knap.pdf.
- Some lectures by Scott Aaronson on Quantum Computing Since Democritus, in particular Lecture 8: Crypto.
- Combinatorial Computing and Cryptography in Gdańsk, November 22-26, 2010
- Advanced Encryption Standard (AES), old official government site at the National Institute of Standards and Technology
- RSA Laboratories
- The SHA-3 Zoo
- Links at Cryptography Research, Inc.