Campus
|
MCS
|
Programs
|
PG
|
Session
|
Fall Semester 2016
|
Course Title
|
Adv Cryptography
|
Course Code
|
IS-843
|
Credit Hours
|
3+0
|
Pre-Requisutes
|
None
|
Course Objectives
|
To understand the cryptanalysis of ciphers
Outcome:
First module of the course is meant for introducing the classical methods of cryptanalysis. Module 2, 3 and 4 all have contents of the modern cryptanalytic techniques of Cryptographic primitives. The outcome will be the knowledge of analysis techniques for encryption algorithms which will help in evaluating the cryptosystems as well as designing new systems.
|
Detail Content
|
- Cryptanalysis of Classical Cryptosystems
Cryptanalysis of some classical ciphers like hill cipher, playfair, transposition ciphers, Cryptanalysis of Rotormachine ciphers like Enigma, M209
- Cryptanalysis of Block Ciphers
Linear Cryptanalysis, The Piling-up Lemma, Linear Approximations of S-boxes, A Linear Attack on an SPN, Differential Cryptanalysis, Differential Cryptanalysis of DES, Slide Attack, Related Key attacks Introduction to Side Channel attacks.
- Cryptanalysis of Stream Ciphers
Correlation attack, Algebraic attack, distinguishing attacks, Fast Walsh Transform, Correlation Immunity and Algebraic Immunity of Boolean functions
- Cryptanalysis of Asymmetric Cryptosystems
Factoring Algorithms, The Pollard p1 Algorithm, The Pollard Rho Algorithm, Dixon’s Random Squares Algorithm, Security of the Rabin Cryptosystem, Semantic Security of RSA, Factoring Algorithms: Pollard’s p-1 , Pollard Rho, Dicson Randomized Square Root, Pomerance
Quadratic Sieve for factor bases , Wiener’s Low Decryption Exponent, Continued Fraction, Quadratic Sieve, Elliptic curve factorization method, Algorithms to attack Discrete Log Problem on Finite Fields: The Silver-Pohling-Hellman, The Index-Calculus
|
Text/Ref Books
|
- Elementary Cryptanalysis: A Mathematical Approach by Abraham Sinkov, Paul L. Irwin
- Cryptanalysis: A Study of Ciphers and Their Solution by Helen Fouché Gaines
- Differential Cryptanalysis of DES-like Cryptosystems by Eli Biham and Adi Shamir
- Applied Cryptanalysis-Breaking Ciphers in the real world
Reference:
- Cryptography Theory & practice/Douglas Robert Stinson Publishing 1995 by CRC Press
- Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone
- Research Papers
|
Time Schedule
|
|
Faculty/Resource Person
|
TVF Dr Mehreen Afzal
|
|