This course covers cryptographic protocols and their application to secure
communication, especially in a network setting.
Handbook of Applied Cryptography (Menezes, Van Oorschot and Vanstone),
CRC Press, 1997 (optional). Network Security: Private Communication in a
Public World, 2nd Ed. (Kaufman, Perlman and Speciner), Prentice Hall, 2002
Three hours of lectures per week.
Their applications to information security, and notions of cryptographic security. Discussion of public-key encryption, secret-key encryption, message authentication, signature schemes, and hash functions.
Passwords, challenge-response, identification schemes (e.g., Fiat-Shamir, Guillou-Quisquater), general techniques for zero-knowledge proofs for NP-complete languages.
Online key distribution using a trusted server (Kerberos). Public-key techniques, including a discussion of Diffie-Hellman key agreement, man-in-the-middle attacks, STS protocol and forward secrecy. Unconditionally secure key distribution, including the Blom scheme and combinatorial key distribution patterns.
Secret sharing schemes (including Shamir threshold schemes and schemes for general access structures). Conference key distribution and broadcast encryption. Copyright protection techniques and tracing schemes.
Models for managing public keys and certificates (X.509 certificates, certification authorities, trust models, certificate verification and revocation, etc.). Applications, including PGP, SSL and IPsec.