Home  Back

IS843 Advance CryptographyII

Campus

MCS

Programs

PG

Session

Spring Semester 2017

Course Title

Advance CryptographyII

Course Code

IS843

Credit Hours

3+0

PreRequisutes


Course Objectives

To introduce advanced topics of Cryptography

Detail Content

 Advanced Mathematics for Cryptography Quadratic residues, and quadratic reciprocity, Legendre Symbol, Jacobi symbol. Algebraic Preliminaries Groups, Fields, Polynomials, Field extensions, Finite fields, Factorization of polynomials, irreducible polynomials, Polynomial ring over R, Polynomial Ring over F, Primitive Polynomials over Finite Fields Introduction to elliptic curves Elliptic Curves, Elliptic Curves over the Real, Elliptic Curves Modulo a Prime, Properties of Elliptic Curves Mathematics for Stream Ciphers Minimal Polynomial and Families of Recurring Sequences, Characterizations and Properties of Linear Recurring Sequences, Boolean Functions.
 Advanced Topics of Notions of Security GameOracle Model for proving security of Cryptographic protocols
 Block Ciphers Security of modes of operations of block ciphers, Evaluation criteria for AES, Correlations and Walsh Transforms, Cryptographic Criteria of SBoxes: Propagation Characteristics, Nonlinearity and Resiliency, Generalization to SBoxes
 Pseudorandomness and Stream Ciphers Linear Feedback Shift Registers, Berlekamp Masssey algorithm, Cryptographic properties of Boolean functions, oneway functions, RSA generator, BBS
 Public key Cryptography Semantic Security of PKC, Probabilistic public key encryption, Elliptic curve based Cryptosystems, ECDSA
 Authentication and Integrity Security of Hash Functions, UFCMA, SUFCMA, Authenticated Encryption, Authentication and Key establishment protocols

Text/Ref Books

 Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone
 Cryptography Theory & practice by Douglas Robert Stinson Publishing 1995 by CRC Press.
 Introduction to Finite Fields and Their Applications by R. Lindl and H. Niederreither, Cambridge Univ. Press, 1986.
 A Course in Number Theory and Cryptography by N.Koblitz, Graduate Text in Mathematics, Springer Verlag, 1987.
 Applied Cryptography by Bruce Schnier Publishing 1996 by Jon Wiley & Sons
 An Introduction to Cryptology by H.C.A van Tilborg, Kluwer Academic Publisher, Boston, 1988.
 Introduction to Modern Cryptography by MihirBellare and Philip Rogaway. September 2005.
 Research Papers

Time Schedule

Spring Semester 2015

Faculty/Resource Person

Dr. Mehreen Afzal , PhD
National University of Science and Technology
Discipline: Information Security
Specialization: Information Security

