ICSI-526/426 CryptographySpring 2016Announcements · Course Objectives · Evaluation · Lectures Notes · Project · Assignments · Recommended Study Material Academic Integrity Policy |
Instructor: Pradeep K. Atrey Office: LI 096C Class Meeting Time: Tuesdays, Thursdays 11:45 a.m. - 1:05 p.m. Class Room: HU137 Office Hours: Tuesdays, Thursdays 2:00 - 4:00 p.m. and By appointment Email: first letter of first name plus last name at albany dot edu Teaching Assistants: Ashish Agarwala (for both 526 & 426), Email:aagarwala at albany dot edu, Office hours: Monday and Wednesday 11am - 1pm. (in LI95E). Rudresh G. Patel (for 426), Email: rpatel2 at albany dot edu, Office hours: Monday and Wednesday 11am - 1pm. (in LI95E).. |
Topics | Reading List |
Introduction to the Course | |
Classical cryptography | R1.2, Univ. of Rhodes Island - Notes |
Modern block ciphers (DES) and modes of operation, AES | R1.3, R1.5 (except 5.1, 5.6), R1.6 (except 6.7) Univ. of Rhodes Island - Notes |
Basic concepts in number theory and finite fields | R1.4 (except 4.4), R1.8.4 |
Public key cryptography 1 (RSA) | R1.8 & R1.9 |
Public key cryptography 2 (D-H key exchange algorithm, El Gamal's cryptosystem, Elliptic Curve cryptography) | R1.10, Web link |
Public Key Cryptography 3 (Message authentication, hash functions and digital signature schemes) | R1.11, R1.12 (except 12.6, 12.7, 12.8), R1.13 (except 13.2, 13.3) |
Shamir's Secret Sharing (SSS) | R2.13, Board scraps |
SSS and Homomorphism 1 | Please see UA blackboard for Board Scraps |
SSS and Homomorphism 2 (Application to large-scale cloud-based multimedia data processing) | - |
Pseudorandom number generation and stream ciphers | R1.7 |
Multimedia Security | Web link |
Besides the information contained in these books, the appropriate material and examples will also be taken from other sources. Students are responsible for all material covered in the class.