Teacher
|
PEDICINI MARCO
(syllabus)
1. Classic Cryptography
- Basic cryptosystems: encryption by substitution, by translation, by permutation, affine cryptosystem, by Vigenère, by Hill. Stream encryption (synchronous and asynchronous), Linear feedback shift registers (LFSR) on finite fields, Autokey cipher. Product ciphers. Basic cryptanalysis: classification of attacks; cryptoanalysis for affine ciphers, for substitution cipher (frequency analysis), for Vigenere cipher: Kasiski test, coincidence index; cryptoanalysis of Hill's cipher and LFSR: algebraic attacks, cube attack.
2. Application of Shannon theory to cryptography
- Security of ciphers: computational security, provable security, unconditional security. Basics of probability: discrete random variables, joint probability, conditional probability, independent random variables, Bayes' theorem. Random variables associated with cryptosystems. Perfect secrecy for encryption systems. Vernam cryptosystem. Entropy. Huffman codes. Spurious Keys and Unicity distance.
3. Block ciphers
- iterative encryption schemes; Substitution-Permutation Networks (SPN); Linear cryptanalysis for SPN: Piling-Up Lemma, linear approximation of S-boxes, linear attacks on S-boxes; Differential cryptanalysis for SPN; Feistel ciphers; DES: description and analysis; AES: description; Notes on finite fields: operations on finite fields, Euclid's generalized algorithm for the computation of the mcd and inverse; Operating modes for block ciphers.
4. Hash functions and codes for message authentication
- Hash functions and data integrity. Safe hash functions: resistance to the pre-image, resistance to the second pre-image, collision resistance. The random oracle model: ideal hash functions, properties of independence. Randomized algorithms, collision on the problem of the second pre-image, collision on the problem of the pre-image. Iterated hash functions; the construction of Merkle-Damgard. Safe Hash Algorithm (SHA-1). Authentication Codes (MAC): nested authentication codes (HMAC).
(reference books)
[1] Antoine Joux, Algorithmic Cryptanalysis, (2010) CRC Press, in inglese; [2] Douglas Stinson, Cryptography: Theory and Practice, 3rd edition, (2006) Chapman and Hall/CRC. [3] Delfs H., Knebl H., Introduction to Cryptography, (2007) Springer Verlag.
|