PTCCS351 Modern Cryptography Syllabus:
PTCCS351 Modern Cryptography Syllabus – Anna University Part time Regulation 2023
COURSE OBJECTIVES:
To learn about Modern Cryptography.
To focus on how cryptographic algorithms and protocols work and how to use them.
To build a Pseudorandom permutation.
To construct Basic cryptanalytic techniques.
To provide instruction on how to use the concepts of block ciphers and message authentication codes.
UNIT I INTRODUCTION
Basics of Symmetric Key Cryptography, Basics of Asymmetric Key Cryptography, Hardness of Functions. Notions of Semantic Security (SS) and Message Indistinguishability (MI): Proof of Equivalence of SS and MI, Hard Core Predicate, Trap-door permutation, Goldwasser-Micali Encryption. Goldreich-Levin Theorem: Relation between Hardcore Predicates and Trap-door permutations.
UNIT II FORMAL NOTIONS OF ATTACKS
Attacks under Message Indistinguishability: Chosen Plaintext Attack (IND-CPA), Chosen Ciphertext Attacks (IND-CCA1 and IND-CCA2), Attacks under Message Non-malleability: NM-CPA and NMCCA2, Inter-relations among the attack model
UNIT III RANDOM ORACLES
Provable Security and asymmetric cryptography, hash functions. One-way functions: Weak and Strong one-way functions. Pseudo-random Generators (PRG): Blum-Micali-Yao Construction, Construction of more powerful PRG, Relation between One-way functions and PRG, Pseudorandom Functions (PRF)
UNIT IV BUILDING A PSEUDORANDOM PERMUTATION
The LubyRackoff Construction: Formal Definition, Application of the LubyRackoff Construction to the construction of Block Ciphers, The DES in the light of LubyRackoff Construction.
UNIT V MESSAGE AUTHENTICATION CODES
Left or Right Security (LOR). Formal Definition of Weak and Strong MACs, Using a PRF as a MAC, Variable length MAC. Public Key Signature Schemes: Formal Definitions, Signing and Verification, Formal Proofs of Security of Full Domain Hashing. Assumptions for Public Key Signature Schemes: One-way functions Imply Secure One-time Signatures. Shamir’s Secret Sharing Scheme. Formally Analyzing Cryptographic Protocols. Zero Knowledge Proofs and Protocols.
30 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
1. Implement Feige-Fiat-Shamir identification protocol.
2. Implement GQ identification protocol.
3. Implement Schnorr identification protocol.
4. Implement Rabin one-time signature scheme.
5. Implement Merkle one-time signature scheme.
6. Implement Authentication trees and one-time signatures.
7. Implement GMR one-time signature scheme.
COURSE OUTCOMES:
CO1: Interpret the basic principles of cryptography and general cryptanalysis.
CO2: Determine the concepts of symmetric encryption and authentication.
CO3: Identify the use of public key encryption, digital signatures, and key establishment.
CO4: Articulate the cryptographic algorithms to compose, build and analyze simple cryptographic solutions.
CO5: Express the use of Message Authentication Codes.
TOTAL:60 PERIODS
TEXT BOOKS:
1. Hans Delfs and Helmut Knebl, Introduction to Cryptography: Principles and Applications, Springer Verlag.
2. Wenbo Mao, Modern Cryptography, Theory and Practice, Pearson Education (Low Priced Edition)
REFERENCES:
1. ShaffiGoldwasser and MihirBellare, Lecture Notes on Cryptography, Available at http://citeseerx.ist.psu.edu/.
2. OdedGoldreich, Foundations of Cryptography, CRC Press (Low Priced Edition Available), Part 1 and Part 23
3. William Stallings, “Cryptography and Network Security: Principles and Practice”, PHI 3rd Edition, 2006.
