{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Modern Cryptology

Modern Cryptology - Cryptology(236506 Prof Eli Biham...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
Cryptology — (236506) Prof. Eli Biham — Computer Science Department Technion, Haifa 32000, Israel August 18, 2010 c circlecopyrt Eli Biham Use and distribution (without modification) of this material are allowed as long as the copyright notices and this permission are maintained, and as long as the full set of slides remains complete. Shimon Even, Dror Rawitz, Moni Shachar, Orr Dunkelman, Elad Barkan and Benny Applebaum made major contributions to these slides. c circlecopyrt Eli Biham - August 18, 2010 1 Introduction (1)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Cryptology Course Lecturer in charge : Eli Biham — Lecturer : Yaniv Carmeli — Assistant : Yohay Kaplan — Prerequisites : 104134 Modern Algebra H 094412 Probability M 236343 Computability Theory c circlecopyrt Eli Biham - August 18, 2010 2 Introduction (1)
Background image of page 2
Cryptology Course (cont.) Grade : 70% exam, 30% exercises (exam grades below 45 will not be combined with the grades of the exer- cises) Exams : 13/2/2011 and 7/3/2011. May include any material taught in the lecture or tutorial, or mentioned in the exercises, as well as any related material. WWW page : http://webcourse.cs.technion.ac.il/236506/ Mailing List : All messages will be posted through the GR/Webcourse mailing list. All students must be registered . c circlecopyrt Eli Biham - August 18, 2010 3 Introduction (1)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
c circlecopyrt Eli Biham - August 18, 2010 4 Introduction (1)
Background image of page 4
Topics Introduction to Cryptology Substitution Ciphers Shannon’s Theory of Secrecy Systems Block Ciphers Differential Cryptanalysis Hashing and One-Time Signatures Merkle’s Puzzles Introduction to Number Theory Public Key Cryptography Diffie-Hellman Key Exchange RSA Rabin’s Variant Related algorithms c circlecopyrt Eli Biham - August 18, 2010 5 Introduction (1)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Topics (cont.) DLOG based signature schemes Mutual Commitments Bit Commitment and Oblivious Transfer Contract Signing Zero-Knowledge Protocols Fiat-Shamir identification scheme Secret Sharing c circlecopyrt Eli Biham - August 18, 2010 6 Introduction (1)
Background image of page 6
What is Cryptology cryptography : The act or art of writing in secret characters. cryptanalysis : The analysis and deciphering of secret writings. cryptology : (Webster’s) the scientific study of cryptography and crypt- analysis. In our context cryptology is the scientific study of protection of information. c circlecopyrt Eli Biham - August 18, 2010 7 Introduction (1)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Cryptographic Services Cryptography supports the following services: 1. Confidentiality ( ) 2. Integrity ( ) 3. Authentication ( ) 4. Identity ( ) 5. Timeliness ( ) 6. Proof of ownership ( ) Each has various different requirements in different circumstances, and each is supported by a wide variety of schemes. c circlecopyrt Eli Biham - August 18, 2010 8 Introduction (1)
Background image of page 8
Applications 1. Communications (encryption or authentication) 2. File and data base security 3. Electronic funds transfer 4. Electronic Commerce 5. Digital cash 6. Contract signing 7. Electronic mail 8. Authentication: Passwords, PINs 9. Secure identification, Access control 10. Secure protocols 11. Proof of knowledge c circlecopyrt Eli Biham - August 18, 2010 9 Introduction (1)
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Applications (cont.) 12. Construction by collaborating parties (secret sharing) 13. Copyright protection 14. etc.
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}