0
Trainer Name

Dan Boneh

Skill Area

Digital Technologies and Digital Transformation

Reviews

0 (0 Rating)

Course Requirements

No requirement needed

Course Description

Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key. Throughout the course participants will be exposed to many exciting open problems in the field and work on fun (optional) programming projects. In a second course (Crypto II) we will cover more advanced cryptographic tasks such as zero-knowledge, privacy mechanisms, and other forms of encryption.

Course Outcomes

1.Course overview and stream ciphers
2.Block Ciphers
3.Message Integrity
4.Authenticated Encryption
5.Basic Key Exchange
6.Public-Key Encryption
7.Final exam

Course Curriculum

1 Course Overview


2 What Is Cryptography


3 History Of Cryptography


4 Discrete Probability


5 Discrete Probability (Continue)


6 Information Theoretic Security


7 Stream Ciphers and Pseudo Random Generators


8 Attacks on Stream Ciphers


9 Real World Stream Ciphers


10 PRG Security Definitions


11 Intractable Problems


12 Semantic Security


13 Stream Ciphers are Semantically Secure


14 What are Block Ciphers


15 The Data Encryption Standard


16 Exhaustive Search Attacks


17 More Attacks on Block Ciphers


18 The AES Block Cipher


19 Block Ciphers from PRGs


20 Review PRPs and PRFs


21 Modes of Operation One Time Key


22 Security for Many Time Key


23 Modes of Operation Many Time Key (CTR)


24 Modes of Operation Many Time Key (CBC)


25 Message Authentication Codes


26 MACs Based On PRFs


27 CBC MAC and NMAC


28 MAC Padding


29 PMAC and the Carter Wegman MAC


30 Introduction


31 Generic Birthday Attack


32 The Merkle Damgard Paradigm


33 Constructing Compression Functions


34 HMAC


35 Timing Attacks on MAC Verification


36 Active Attacks on CPA Secure Encryption


37 Definitions


38 Chosen Cipher Text Attacks


39 Constructions From Ciphers and MACs


40 Case study TLS


41 CBC Padding Attacks


42 Attacking Non-Atomic Decryption


43 Key Derivation


44 Deterministic Encryption


45 Deterministic Encryption SIV and Wide PRP


46 Tweakable Encryption


47 Format Preserving Encryption


48 Trusted 3rd Parties


49 Merkle Puzzles


50 The Diffie Hellman Protocol


51 Public Key Encryption


52 Notation


53 Fermat and Euler


54 Modular Eth Roots


55 Arithmetic Algorithms


56 Intractable Problems


57 Definitions and Security


58 Constructions


59 The RSA Trapdoor Permutation


60 PKCS 1


61 Is RSA a One-Way Function


62 RSA in Practice


63 The El Gamal Public Key System


64 El Gamal Security


65 Farewell


66 El Gamal Variants With Better Security


Learner Feedback

Cryptography

0

Course Rating
0.00%
0.00%
0.00%
0.00%
0.00%

No Review found

Log In or Sign Up as learner to post a review

Shopping Cart

Loading...