Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University



Similar documents
Advanced Topics in Cryptography and Network Security

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

CS 758: Cryptography / Network Security

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Cryptography & Network Security

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

SE 4472a / ECE 9064a: Information Security

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

CSE/EE 461 Lecture 23

CPSC 467b: Cryptography and Computer Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Cryptographic Hash Functions Message Authentication Digital Signatures

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Introduction to Cryptography CS 355

CSci 530 Midterm Exam. Fall 2012

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

An Introduction to Cryptography as Applied to the Smart Grid

HW/Lab 1: Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

CS 464/564 Networked Systems Security SYLLABUS

INFORMATION SECURITY A MULTIDISCIPLINARY. Stig F. Mjolsnes INTRODUCTION TO. Norwegian University ofscience & Technology. CRC Press

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Introduction. Digital Signature

Cryptography & Digital Signatures

Table of Contents. Bibliografische Informationen digitalisiert durch

Lukasz Pater CMMS Administrator and Developer

Cryptography and Key Management Basics

Data Encryption and Network Security

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

A Factoring and Discrete Logarithm based Cryptosystem

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Computational Soundness of Symbolic Security and Implicit Complexity

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Efficient Unlinkable Secret Handshakes for Anonymous Communications

CSCE 465 Computer & Network Security

Information Security and Cryptography

CS 5490/6490: Network Security Fall 2015

Public Key (asymmetric) Cryptography

CSci 4211: Data Communications and Computer Networks. Time: Tuesday and Thursday 8:15 to 9:30 am Location: Phyics 170 Spring 2015, 3 Credits

CPSC 467: Cryptography and Computer Security

CS 356 Lecture 28 Internet Authentication. Spring 2013

Challenges in Teaching a Graduate Course in Applied Cryptography

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Cryptography and Network Security Chapter 15

MS-55096: Securing Data on Microsoft SQL Server 2012

An Introduction to Cryptography and Digital Signatures

Lecture II : Communication Security Services

1 Signatures vs. MACs

Lecture 9 - Message Authentication Codes

Course Design Document. IS403: Advanced Information Security and Trust

Chapter 7 Transport-Level Security

SECURITY IN NETWORKS

CS 341: Foundations of Computer Science II elearning Section Syllabus, Spring 2015

Module: Applied Cryptography. Professor Patrick McDaniel Fall CSE543 - Introduction to Computer and Network Security

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

How To Understand And Understand The History Of Cryptography

CS 450/650 Fundamentals of Integrated Computer Security

Cryptography and Network Security

Chapter 6 Electronic Mail Security

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptographic mechanisms

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Chapter 7: Network security

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Computer Security: Principles and Practice

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

TELECOMMUNICATION NETWORKS

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Advanced Cryptography

Lecture 25: Pairing-Based Cryptography

Lecture 15 - Digital Signatures

Transcription:

Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic University Outline Administrative Stuff Introductory Technical Stuff

Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s10 Instructor: Nitesh Saxena Office: LC228 Email: nsaxena@poly.edu Phone No: 718-260-3116 Office Hours: Wednesday 4-5pm (or by appointment) MyPoly Web Page: http://my.poly.edu/ About the Instructor PhD from UC Irvine Research in computer and network security, and applied cryptography Web page: http://cis.poly.edu/~nsaxena

Prerequisites 1. Discrete Mathematics (MA 2312/2322) 2. Design and Analysis of Algorithms (CS603 or CS3414) 3. Data Analysis (MA2212) or equivalent Basically, what you need is: Good mathematical background Knowledge of basic probability theory Knowledge of basic algorithms If you don t satisfy the prerequisites as such, but are interested, I encourage you to take the course. But, do talk to me. What to Expect The course would be theoretical With theorems and proofs No programming whatsoever We will have few homeworks We will have a project based on a relevant topic in cryptography I can suggest some projects You are also free to choose your own project, after discussion with me There will be a mid-term quiz Grading 50% homeworks 10% mid-term quiz 10% notes scribing (latex) 30% project (plus a class presentation of the project)

What to Expect Homeworks to be completed individually No collaboration Latex scribing to be done in groups of 3 Project is to be done in groups of 3 Mid-term no collaboration What are my expectations of you Attend lectures Take notes; ask questions Review your notes and the scribe right after the lecture; refer to relevant material Use my office hrs to clear your doubts and for any help I ll try to review last lecture at the beginning of every lecture Ask questions then Turn your homeworks on time; no extensions or late submissions are allowed Be prompt in choosing your project topic Please use your Poly email id to communicate with me; I ll be using it to communicate with you.

Today s scribe Volunteer? Olufisan, Sarwar, and Nathan? I ll bring in a sign-up sheet next time. Other Security Courses at Poly Computer Security CS 392/6813 Network Security CS 6823 Other specialized courses

Course References Primary reference: some free online lecture material developed by wellknown cryptographers, such as: http://www-cse.ucsd.edu/users/mihir/papers/gb.html http://cseweb.ucsd.edu/~mihir/cse207/index.html Secondary reference: Introduction to Modern Cryptography, Jonathan Katz and Yehuda Lindell (available from Amazon) Other References The online book on applied cryptography might be useful: http://www.cacr.math.uwaterloo.ca/hac/ Other links to be provided as we proceed

What is Cryptography Etymologically: secret (crypt) writing (graphy) Study of mathematical techniques to achieve various goals in information security, such as confidentiality, integrity, availability, non-repudiation, etc (we cover these today!) Not the only (and not a sufficient) means of providing information security, rather a subset of techniques Quite an old field! A cryptographer designs the code, a cryptanalyst tries to break it Philosophically, cryptography is a contest between the cryptographer and the cryptanalyst! What is the course about Study of modern cryptography from a theoretical perspective Study of cryptographic primitives that are the building-blocks of various cryptographic applications provable security concept; formal analysis

How we would proceed in the course Study a cryptographic primitive (such as encryption) Study its security notions What it means for a cryptographic primitive to be secure (for example, what it means for an encryption scheme to be secure) What is the adversarial model Study its various constructions (such as symmetric key encryption DES, public key encryption RSA) Formally anlayze the security of a particular construction based on a particular security notion Theorem-Proofs (provable security) [Time permitting] Study how to combine various crypto primitives for a cryptographic application/protocol CS 6903 vs. CS 392/6813 Study a cryptographic primitive (such as encryption) Study its security notions What it means for a cryptographic primitive to be secure (for example, what it means for an encryption scheme to be secure) What is the adversarial model Study its various constructions (such as symmetric key encryption DES, public key encryption RSA) Formally anlayze the security of a particular construction based on a particular security notion Theorem-Proofs (provable security)

Tentative Course Schedule Symmetric encryption (block ciphers) Pseudo-random functions Hash functions and random oracles Message authentication code Number Theory Asymmetric encryption Digital signatures [Protocols for authenticated key exchange] Why Take this Course Cryptography is HOT If you are theory-inclined, it s an interesting course to take If you work in the general area of security, it s an important course to take One of the mandatory course for the MS program in Cyber-Security According to the MS/PhD course curriculum, you are required to take at least 2 courses from the THEORY area, of which this this course is one. Theory Core Area for MS CS 6003 Foundations of Computer Science CS 6033 Design and Analysis of Algorithms I CS 6043 Design and Analysis of Algorithms II CS 6753 Theory of Computation CS 6903 Modern Cryptography CS 9173 Computational Geometry

Some Basic Goals in Information Security Confidentiality Authentication Integrity Availability Non-repudiation Cryptography can be used to achieve these goals Let s see how and warm up a little bit!! Please take notes Today s Reading http://www-cse.ucsd.edu/users/mihir/cse207/w-intro.pdf