Cryptography Handbook1
Cryptography Handbook1
Unit Team
Dr. Gregory Epiphaniou Prof. Song Yan Dr Hui Cheng [email protected] [email protected] [email protected] C114 D105 C105 3934 9307 3933
GE 2011/12
No practical(s) the first week Public Key Cryptography RSA (SY) Public-Key System: DHM/ElGamal (SY) Public-Key Cryptography: Elliptic Curve Cryptography ECC (SY) Public-Key Cryptography: Digital Signatures, Hashing Functions and Certificates (SY) Key Concepts and the History of Cryptography (HC) Private-Key Cryptography:Monographic and Polygraphic Ciphers (HC) Private-Key Cryptography: DES/AES (HC) Private-Key Cryptography: RC4, RC5,RC6 Private-Key Cryptography: Stream Ciphers and One-Time Pads (HC) Introduction to modern Cryptanalysis (GE) Breaking Symmetric Algorithms(GE) Breaking Hash Functions (GE) REVISION (GE, SY, HC) EXAMS
Please be aware that the order of the lectures might change without notice
Referral Work If you fail to meet the Learning Outcomes for the above assessments and are referred, there will be an opportunity to repeat any of the assessment points at a time to be indicated on BREO (http://breo.beds.ac.uk). It is your responsibility to find out about referral dates for any of the assignment points posted in this handbook.
GE 2011/12
CIS014-6 Cryptography and Cryptanalysis ACCESS TO UNIT HANDOUTS AND OTHER RELEVANT INFORMATION Description and Rationale The purpose of this unit is to provide an in-depth and specialized knowledge around the cryptography concepts and methods. This unit provides students with fundamental and advanced topics related to cryptographic algorithms operations including recent developments in the field. All the methods and mechanisms for cryptanalysis are also delivered in the core of this unit. The theoretical material including those aspects is also articulated in the curriculum. More precisely, Cryptography development from Caesar cipher, Vigenres encryption scheme to Hash family, Steganography and Quantum cryptography are core elements taught in this unit.
Aim: Provide a strong understanding in the theoretical aspects of modern cryptography Critically evaluate current techniques and reflect upon strengths and weaknesses of current cryptographic methods/techniques Enhance and demonstrate an in-depth knowledge of modern cryptanalysis Critically evaluate existing mechanisms for confidentiality and authentication Demonstrate an outstanding use of the cryptographic algorithms for a given scenario and the ability to optimally select a method from a pool of alternatives Critically evaluate security principles and methods in terms of their benefits and inherent limitations
Learning Outcomes On successful completion of the unit, students will be able: Specify and critically evaluate current cryptographic algorithms and tools employing such mechanisms
Assessment Criteria To achieve the learning outcome you must demonstrate the ability to: Critically review and use the majority of the tools that employ ciphers and study their core operations in terms of the mathematical operations during the encryption/decryption process Fully justify the different types of cryptography and the structure of each type underpinning the frameworks governing their operation Extensively practice the tools and methods provided for practical cryptography. The assessment strategy for this unit will ensure that the material has been articulated appropriately Critically review one or more emergent paradigms that underpin modern security flaws on existing implementations and discuss how future trends can address those issues. Fully justify selections in relation to a given case study as part of the in course assessment. Use referenced sources for attacking cryptosystems and be familiarised with processes and strategies Combine the characteristics of the mechanisms/algorithms examined in order to stress out the areas of improvement and selection of the optimal solutions
Investigate in-depth the core structure and operation(s) of modern ciphers and authentication primitives Demonstrate a strong technical proficiency on applying current cryptographic methods to specific scenarios and critically reflect upon the best alternatives for a given case Evaluate strengths and weaknesses for each cryptographic algorithm on the basis of performance and applicability Critically evaluate all the modern cryptanalysis techniques, methods and tools to attack a crypto-system Critically evaluate and select areas of practical implementation and reflect upon security mechanisms currently using cryptographic concepts
GE 2011/12
Learning Strategies Delivery will be achieved by a combination of lectures, practical sessions and independent study. In addition, the Blackboard Virtual Learning Environment will be used in the delivery of the unit content. (http://www.breo.beds.ac.uk) It is expected that a student will do at least 150 hours of study for this unit breakdown as shown into various categories of study. Lectures Practical Activities Directed Learning Independent Study 26 hours 13 hours 36 hours 75 hours
Students should note that this unit booklet plus additional materials will be published weekly on the CIS014-6 BREO site: Weekly Lecture Handout Weekly Practical exercises Assessment details
Essential Practical Cryptography, Niels Gerguson and Bruce Scheier Modern Cryptanalysis: Techniques for Advanced Code Breaking, Christopher Swenson nd Stallings W (2003), Network Security Essentials, 2 Ed, Prentice-Hall. Background J. A. Buchmann, Introduction to Cryptography with Coding Theory, Springer-Verlag, 2002. ISBN 0-387-95034-6 O. Goldreich, Foundations of Cryptography, Vol I, Basic Tools, Cambridge University Press, 2001. ISBN 0-521-79172-3 O. Goldreich, Foundations of Cryptography, Vol II, Basic Applications, Cambridge University Press, 2004. 0-521-83084-2 A. J. Menezes, P. C. Ooschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997. ISBN 0-8493-8523-7 M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, Cambridge University Press, 2001. ISBN 0-521-63503-9 N. Smart, An Introduction to Cryptography, McGraw-Hill, 2002. ISBN 0-0770-9987-7 rd D. R. Stinson, Cryptography: Theory and Practice, 3 Edition, CRC Press, 2005. ISBN 158488-508-4 W. Trappe and L. Washington, Introduction to Cryptography with Coding Theory, 2nd Edition, Prentice-Hall, 2005. 0-13-198199-0 S. Yan, Cryptanalytic Attacks on RSA, Springer, 2008. ISBN 0-387-77267-7 S. Yan, Primality Testing and Integer Factorization in Public-Key Cryptography, Springer, 2009 ISBN 0-387-77267-7. Boyd Colin and Manuria, A. (2010): Protocols for Authentication and Key Establishment, Springer Boyd C. et. al. (2007) Information Security, Springer-Verlag New York, LLC Series: Lecture Notes in Computer Science, Series, #2851, ISBN: 3540201769
GE 2011/12
GE 2011/12