Fall 2015, M. Tech (CS) II Year, Indian Statistical Institute
“Cryptography: Theory and Practice” by Douglas R. Stinson, Chapman and Hall/CRC, Third Edition, 2005.
“Introduction to Modern Cryptography: Principles and Protocols” by Jonathan Katz and Yehuda Lindell, Chapman and Hall/CRC, First Edition, 2007.
Break up: Scribe: 20, Assignments: 15, Midsem: 25, Final: 40.
Scribe of Lectures:
Note that these scribes contain only a summary of what is discussed in class and do not necessarily cover all the points in detail.
- Lecture 1: Introduction to Cryptology; Classical Ciphers I
- Lecture 2: Classical Ciphers II; Some number theoretic results on GCD
- Lecture 3: Classical Ciphers III; Kerckhoff’s Principle; Definition of Security
- Lecture 4: Perfect Secrecy: Several Equivalent Formulations
- Lecture 5: Limitations of Perfect Secrecy; Shannon’s Theorem
- Lecture 6: Computational Security
- Lecture 7: LFSR I; Finite Fields
- Lecture 8: LFSR II; Boolean Functions
- Lecture 9: Modern Block Ciphers; Linear and Differential Attacks
- Lecture 10: DES and AES; Mode of Operations
- Lecture 11: MAC and Hash Functions
- Lecture 12: Introduction to PKC; RSA I
- Lecture 13: RSA II; ElGamal; Knapsack
- Lecture 14: RSA Variants; Digital Signatures and Certificates; PKI
- Lecture 15: Key Exchange Protocols