National University of Sciences and Technology
Home | Back
IS-843 Advance Cryptography-II
Campus MCS
Programs PG
Session Spring Semester 2017
Course Title Advance Cryptography-II
Course Code IS-843
Credit Hours 3+0
Course Objectives To introduce advanced topics of Cryptography
Detail Content
  1. Advanced Mathematics for Cryptography Quadratic residues, and quadratic reciprocity, Legendre Symbol, Jacobi symbol. Algebraic Preliminaries Groups, Fields, Polynomials, Field extensions, Finite fields, Factorization of polynomials, irreducible polynomials, Polynomial ring over R, Polynomial Ring over F, Primitive Polynomials over Finite Fields Introduction to elliptic curves Elliptic Curves, Elliptic Curves over the Real, Elliptic Curves Modulo a Prime, Properties of Elliptic Curves Mathematics for Stream Ciphers Minimal Polynomial and Families of Recurring Sequences, Characterizations and Properties of Linear Recurring Sequences, Boolean Functions.
  2. Advanced Topics of Notions of Security Game-Oracle Model for proving security of Cryptographic protocols
  3. Block Ciphers Security of modes of operations of block ciphers, Evaluation criteria for AES, Correlations and Walsh Transforms, Cryptographic Criteria of S-Boxes: Propagation Characteristics, Nonlinearity and Resiliency, Generalization to S-Boxes
  4. Pseudo-randomness and Stream Ciphers Linear Feedback Shift Registers, Berlekamp Masssey algorithm, Cryptographic properties of Boolean functions, one-way functions, RSA generator, BBS
  5. Public key Cryptography Semantic Security of PKC, Probabilistic public key encryption, Elliptic curve based Cryptosystems, ECDSA
  6. Authentication and Integrity Security of Hash Functions, UF-CMA, SUF-CMA, Authenticated Encryption, Authentication and Key establishment protocols
Text/Ref Books
  1. Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone
  2. Cryptography Theory & practice by Douglas Robert Stinson Publishing 1995 by CRC Press.
  3. Introduction to Finite Fields and Their Applications by R. Lindl and H. Niederreither, Cambridge Univ. Press, 1986.
  4. A Course in Number Theory and Cryptography by N.Koblitz, Graduate Text in Mathematics, Springer Verlag, 1987.
  1. Applied Cryptography by Bruce Schnier Publishing 1996 by Jon Wiley & Sons
  2. An Introduction to Cryptology by H.C.A van Tilborg, Kluwer Academic Publisher, Boston, 1988.
  3. Introduction to Modern Cryptography by MihirBellare and Philip Rogaway. September 2005.
  4. Research Papers
Time Schedule Spring Semester 2015
Faculty/Resource Person Dr. Mehreen Afzal , PhD
National University of Science and Technology
Discipline: Information Security
Specialization: Information Security