Syllabus

Grading

Midterm

25 pts
(In-class, written, maybe MCQ)

Final 40 pts
(In-class, written, maybe MCQ)
Homeworks 25 pts
Expect to have 5-7 homeworks
Quizzes and Attendance

10 pts

Outline

Introduction to Information Security
  • Why do we need security?
  • Confidentiality, Integrity, Availability
  • Authentication, Authorization, Accounting
  • Information Theory
  • Encoding, Compression, Encryption
Classical Cryptosystems
  • Monoalphabetic Systems
  • Polyalphabetic Systems
  • Substitution Ciphers
  • Transposition Ciphers
  • Cryptanalysis: Brute Force, Frequency Analysis, Kasiski Analysis
Character Encoding Fundamentals
  • From alphabet to bits
  • Representations: Binary, Decimal, Hexadecimal
  • Encoding Schemes: ASCII, UTF, ISO
  • Bit-wise operations
Block Ciphers
  • Boolean Functions: Truth tables, Non-linearity, Walsh transform
  • Building blocks: SP-Networks, Feistel Structure
  • DES
  • AES Competition and Candidates
  • Mode of Operations
  • Cryptanalysis: Differential and Linear Cryptanalysis
  • Authenticated Encryption
Stream Ciphers
  • Building blocks: LFSR, Combining functions, Linear Complexity
  • Random Number Generators: Key stream generator
  • PRNGs and TRNGs
  • eSTREAM Ciphers
Hash Functions
  • Building Blocks: Resistance (Pre-image, 2nd Pre-image, Collusion), ARX, Merkle–Damgard, Sponge
  • SHA3 Competition and Candidates
  • Password hashing and cracking: Salting, Rainbow tables, Key Derivation Functions
  • Message Authentication Codes

Midterm
 
An Introduction to Number Theory
  • Fundamental Theorem of Arithmetic
  • Modular arithmetic
  • Prime numbers and primality tests
  • Euler Totient Function
  • Extended Euclidean algorithm
Public Key Cryptography
  • Trapdoor functions: Computational complexity, Mathematical problems: Discrete Logarithm, Factorization
  • Key Exchange Problem
  • Diffie-Hellman Key Exchange: Man-in-the-Middle attacks
  • RSA
  • ElGamal
  • ECC
  • Digital Signatures
More Cryptographic Primitives
  • Hybrid Encryption
  • Lightweight ciphers
  • Quantum Cryptography
  • Post-quantum Cryptography
  • Steganography
  • Secret Sharing
  • Homomorphic Encryption
Protocols and Applications
  • Blockchain Fundamentals
  • Public Key Infrastructure: TLS
  • PGP
  • TOR
  • OTR and E2EE
  • TOTP/HOTP
  • Wireless Comm: Wi-Fi, Bluetooth, GSM
  • IPSec, Wireguard, OpenVPN
  • Cryptography in daily life
  • Cryptography tools

Final
 

Last Update: 21.02.2024