Modern Cryptology

Modern Cryptology - Cryptology — éìè éø÷ (236506)...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Cryptology — éìè éø÷ (236506) Prof. Eli Biham — í ééìø Computer Science Department Technion, Haifa 32000, Israel August 18, 2010 c circlecopyrt Eli Biham Use and distribution (without modification) of this material are allowed as long as the copyright notices and this permission are maintained, and as long as the full set of slides remains complete. Shimon Even, Dror Rawitz, Moni Shachar, Orr Dunkelman, Elad Barkan and Benny Applebaum made major contributions to these slides. c circlecopyrt Eli Biham - August 18, 2010 1 Introduction (1) Cryptology Course Lecturer in charge : Eli Biham — í ééì Lecturer : Yaniv Carmeli — éìîøë éð é Assistant : Yohay Kaplan — ïì÷ éé Prerequisites : 104134 Modern Algebra H ú éðøîøì 094412 Probability M îúøú ñ 236343 Computability Theory ú éù éú øú c circlecopyrt Eli Biham - August 18, 2010 2 Introduction (1) Cryptology Course (cont.) Grade : 70% exam, 30% exercises (exam grades below 45 will not be combined with the grades of the exer- cises) Exams : 13/2/2011 and 7/3/2011. May include any material taught in the lecture or tutorial, or mentioned in the exercises, as well as any related material. WWW page : http://webcourse.cs.technion.ac.il/236506/ Mailing List : All messages will be posted through the GR/Webcourse mailing list. All students must be registered . c circlecopyrt Eli Biham - August 18, 2010 3 Introduction (1) ïîí éì éøú÷ éúòì ïé øîù ðò éí é÷ éúòî ììëúøîìê éøöù ì í éééí éì éøúúù :ìî éù c circlecopyrt Eli Biham - August 18, 2010 4 Introduction (1) Topics Introduction to Cryptology Substitution Ciphers Shannon’s Theory of Secrecy Systems Block Ciphers Differential Cryptanalysis Hashing and One-Time Signatures Merkle’s Puzzles Introduction to Number Theory Public Key Cryptography Diffie-Hellman Key Exchange RSA Rabin’s Variant Related algorithms c circlecopyrt Eli Biham - August 18, 2010 5 Introduction (1) Topics (cont.) DLOG based signature schemes Mutual Commitments Bit Commitment and Oblivious Transfer Contract Signing Zero-Knowledge Protocols Fiat-Shamir identification scheme Secret Sharing c circlecopyrt Eli Biham - August 18, 2010 6 Introduction (1) † What is Cryptology • cryptography : The act or art of writing in secret characters. • cryptanalysis : The analysis and deciphering of secret writings. • cryptology : (Webster’s) the scientific study of cryptography and crypt- analysis. In our context cryptology is the scientific study of protection of information. c circlecopyrt Eli Biham - August 18, 2010 7 Introduction (1) Cryptographic Services Cryptography supports the following services: 1. Confidentiality ( ú éñ ) 2. Integrity ( úîìù ) 3. Authentication ( úî ) 4. Identity ( ú ) 5. Timeliness ( ïîéú ) 6. Proof of ownership ( úìòúë ) Each has various different requirements in different circumstances, and each is supported by a wide variety of schemes....
View Full Document

This note was uploaded on 04/14/2011 for the course CS 236506 taught by Professor Yanivcarmeli during the Spring '11 term at Technion.

Page1 / 52

Modern Cryptology - Cryptology — éìè éø÷ (236506)...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online