CENG 471

Cryptography

Basic terminology, history & background, Symmetrical cryptosystems, DES-AES, DES-AES likes, Asymmetrical cryptosystems, primality, hashing, factorization based (RSA)- ECC-Lattice cryptosystems, cryptographic protocols & applications, secrecy, authentication, integrity-authenticity, digital signatures, standards.

Course Objectives

To teach the security functions. To teach that which security functions are realized by which cryptographic tools. Teaching the relationship between the historical evolution of the symmetrical/asymmetrical cryptosystems and the developments of the technological and social life. Teaching that how the measure of the security level for cryptographic solutions and how the implement the international standards. To teach the currently relevant security solutions of information and communication technologies.

Recommended or Required Reading

W.Trappe, L.Washington, ‘Introduction to Cryptography with Coding Theory’, Pearson, 2006 ,P. Gutman, ‘Cryptographic Security Architecture’, Springer, 2004 ,D. R. Stinson, ‘Cryptography, Theory and Practice’, Chapman & Hall/CRC Press, 2002 ,B. Schneider, ‘Applied Cryptography, Protocols, Algorithms, and Source Code in C’, John Wiley & Sons, 1996

Learning Outcomes

1. Analyze vulnerabilities, threats and which security functions are realized.

2. Selection, implementation and testing of cryptographic tools for essential security functions.

3. Objectively read the technological evolution and efficiently analyzing of new requirements for the cryptographic solutions.

4. Usage ability of the international standards for the developed cryptographic solutions.

5. Selection of the best solution and implementation ability for a cryptographic security solution depends on security requirements of domain.

Topics
Introduction to Cryptography with basic definitions and concepts
Information Theory and Probability Theory and Cryptography
Monoalphebetical and Polyalphabetical Crypto
Transpositions-Permutations
Block Ciphering, DES and AES
Symmetrical Key Management and Security Architecture
Symmetrical Cryptosystem Design and Verification
Introduction to Number Theory I
Introduction to Number Theory II
Factorization based Asymmetrical Cryptosystems – RSA
Discrete Logarithm Problem and Cryptosystems: DHKE, ElGamal
Elliptic Curve Cryptosystems- ECC
Public Key Infrastructures
Design of Cryptographic Protocols: FIPS 140-2/3

Grading

Midterm: 25%

Homework: 30%

Presentation: 20%

Final: 25%