About this Course
Cryptography is an indispensable software for shielding data in pc methods. On this course you’ll study the inside workings of cryptographic methods and find out how to accurately use them in real-world purposes. The course begins with an in depth dialogue of how two events who’ve a shared secret key can talk securely when a robust adversary eavesdrops and tampers with site visitors. We’ll study many deployed protocols and analyze errors in present methods. The second half of the course discusses public-key methods that allow two events generate a shared secret key. All through the course contributors will probably be uncovered to many thrilling open issues within the subject and work on enjoyable (optionally available) programming initiatives. In a second course (Crypto II) we are going to cowl extra superior cryptographic duties reminiscent of zero-knowledge, privateness mechanisms, and different types of encryption.
SKILLS YOU WILL GAIN
- Cryptographic Assaults
- Public-Key Cryptography
- Symmetric-Key Algorithm
Syllabus – What you’ll study from this course
5 hours to finish
Course overview and stream ciphers
Week 1. This week’s matter is an outline of what cryptography is about in addition to our first instance ciphers. You’ll study pseudo-randomness and find out how to use it for encryption. We may even have a look at a number of primary definitions of safe encryption.
4 hours to finish
Week 2. We introduce a brand new primitive known as a block cipher that can allow us to construct extra highly effective types of encryption. We’ll have a look at a number of basic block-cipher constructions (AES and 3DES) and see find out how to use them for encryption. Block ciphers are the work horse of cryptography and have many purposes. Subsequent week we are going to see find out how to use block ciphers to offer knowledge integrity. The optionally available programming task this week asks college students to construct an encryption/decryption system utilizing AES.
3 hours to finish
Week 3. This week’s matter is knowledge integrity. We’ll focus on various basic constructions for MAC methods which can be used to make sure knowledge integrity. For now we solely focus on find out how to stop modification of non-secret knowledge. Subsequent week we are going to come again to encryption and present find out how to present each confidentiality and integrity. This week’s programming undertaking exhibits find out how to authenticate massive video information. Even when you don’t do the undertaking, please learn the undertaking description — it teaches an vital idea known as a hash chain.
4 hours to finish
Week 4. This week’s matter is authenticated encryption: encryption strategies that guarantee each confidentiality and integrity. We may even focus on a number of odds and ends reminiscent of find out how to search on encrypted knowledge. That is our final week learning symmetric encryption. Subsequent week we begin with key administration and public-key cryptography. As normal there’s additionally an additional credit score programming undertaking. This week’s undertaking entails a little bit of networking to experiment with a selected ciphertext assault on a toy web page.