National University of Sciences and Technology
Home | Back
IS-843 Adv Cryptography
Campus MCS
Programs PG
Session Fall Semester 2016
Course Title Adv Cryptography
Course Code IS-843
Credit Hours 3+0
Pre-Requisutes None
Course Objectives To understand the cryptanalysis of ciphers

Outcome:
First module of the course is meant for introducing the classical methods of cryptanalysis. Module 2, 3 and 4 all have contents of the modern cryptanalytic techniques of Cryptographic primitives. The outcome will be the knowledge of analysis techniques for encryption algorithms which will help in evaluating the cryptosystems as well as designing new systems.
Detail Content
  • Cryptanalysis of Classical Cryptosystems Cryptanalysis of some classical ciphers like hill cipher, playfair, transposition ciphers, Cryptanalysis of Rotormachine ciphers like Enigma, M209
  • Cryptanalysis of Block Ciphers Linear Cryptanalysis, The Piling-up Lemma, Linear Approximations of S-boxes, A Linear Attack on an SPN, Differential Cryptanalysis, Differential Cryptanalysis of DES, Slide Attack, Related Key attacks Introduction to Side Channel attacks.
  • Cryptanalysis of Stream Ciphers Correlation attack, Algebraic attack, distinguishing attacks, Fast Walsh Transform, Correlation Immunity and Algebraic Immunity of Boolean functions
  • Cryptanalysis of Asymmetric Cryptosystems Factoring Algorithms, The Pollard p1 Algorithm, The Pollard Rho Algorithm, Dixon’s Random Squares Algorithm, Security of the Rabin Cryptosystem, Semantic Security of RSA, Factoring Algorithms: Pollard’s p-1 , Pollard Rho, Dicson Randomized Square Root, Pomerance Quadratic Sieve for factor bases , Wiener’s Low Decryption Exponent, Continued Fraction, Quadratic Sieve, Elliptic curve factorization method, Algorithms to attack Discrete Log Problem on Finite Fields: The Silver-Pohling-Hellman, The Index-Calculus
Text/Ref Books
  1. Elementary Cryptanalysis: A Mathematical Approach by Abraham Sinkov, Paul L. Irwin
  2. Cryptanalysis: A Study of Ciphers and Their Solution by Helen Fouché Gaines
  3. Differential Cryptanalysis of DES-like Cryptosystems by Eli Biham and Adi Shamir
  4. Applied Cryptanalysis-Breaking Ciphers in the real world
 Reference:
  1. Cryptography Theory & practice/Douglas Robert Stinson Publishing 1995 by CRC Press
  2. Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone
  3. Research Papers
Time Schedule
Faculty/Resource Person TVF Dr Mehreen Afzal