CAS CS 538 Cryptography.

Slides:



Advertisements
Similar presentations
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
Advertisements

Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
Mid-term Review Network Security. Gene Itkis: CS558 Network Security2 Secure channel SSL SSL (and many others: incl. IPSEC) Shared key establishing Trusted.
CAS CS 591 i1 (CS ) Network Security Administrativia.
CMSC 456 Introduction to Cryptography
CAS CS 558 Network Security. Administrativia 6/14/2015Gene Itkis, CS558: Computer Network Security3 General info Instructor: Gene Itkis itkis+cs558 cs.bu.eduitkis+cs558.
Network Security Review. Secure channel Communication security Confidentiality Message Traffic Authentication Integrity How to achieve? Establish shared.
CAS CS 330 Algorithms Administrativia 6/15/2015Gene Itkis, CS330 Algorithms3 General info Instructor: Gene Itkis
CAS CS 235 Algebraic Algorithms Administrativia.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
CAS CS113 Intro to CS II w/Intensive C++ Data Structures in C++
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
Computer Security CS 426 Lecture 3
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions J. Buchmann, E. Dahmen, A. Hülsing | TU Darmstadt |
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Class 2 Cryptography Refresher CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Information Security CS 526
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
RSA Laboratories’ PKCS Series - a Tutorial
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
RSA Slides by Kent Seamons and Tim van der Horst
Topic 26: Discrete LOG Applications
사물네트워크 시스템 보안 - Focused on Advanced Cryptography-
Public Key Encryption and Digital Signatures
Information Security CS 526
Public-Key Cryptography and RSA
Public Key Encryption and the RSA Algorithm
Authenticated encryption
Digital signatures.
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
Digital Signatures Last Updated: Oct 14, 2017.
Digital Signature Schemes and the Random Oracle Model
CAS CS112 Intro to CS II w/ C++
B504/I538: Introduction to Cryptography
Topic 5: Constructing Secure Encryption Schemes
Cryptography and Computer Security for Undergraduates
Cryptography Lecture 27.
Cryptography and Security Fall 2009 Steve Lai
Cryptography Lecture 19.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Cryptography Lecture 6.
CAS CS 558 Network Security.
Foundations of Network and Computer Security
Cryptography Lecture 24.
Information Security CS 526
Introduction to Cryptography
Cryptography Lecture 12.
Topic 13: Message Authentication Code
Symmetric-Key Cryptography
Cryptography Lecture 14.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Introduction to Cryptography
Cryptography Lecture 13.
Combinatoric Structures
Cryptography Lecture 13.
Cryptology Design Fundamentals
Cryptography Lecture 18.
Cryptography Lecture 27.
Blockchains Lecture 6.
LAB 3: Digital Signature
Presentation transcript:

CAS CS 538 Cryptography

Administrativia

General info Instructor: Course page: Gene Itkis (itkis+cs538@cs.bu.edu) Course page: www.cs.bu.edu/fac/itkis/538 Also found from the CS dept. courses page 11/22/2018 Gene Itkis, CS538 Crypto

General Info Prerequisite: CS 332 or consent of instructor Relation to CS458 Overlap exists, but approach is different Here (cs538) much more formal & rigorous Homeworks pen & paper ~weekly 11/22/2018 Gene Itkis, CS538 Crypto

WEB page Info sources Office hours: M 12-1pm, W 2:30-4:30pm www.cs.bu.edu/~itkis/538 Office hours: M 12-1pm, W 2:30-4:30pm email – mailing list: csmail –a cs538 For personal mail remember: there are many of you, 1 of me. So please do not take it personally in case of delays. Do not hesitate to call or stop by, esp. in case of delays! 11/22/2018 Gene Itkis, CS538 Crypto

Collaboration NO!!! Discussing concepts and ideas, as well as system features is OK (encouraged!!!) Always give credit when using someone else’s work See web page for more details 11/22/2018 Gene Itkis, CS538 Crypto

Grading Approximately: 70% - homeworks 30% - final No midterm! 11/22/2018 Gene Itkis, CS538 Crypto

End of Administrativia Questions? End of Administrativia

Topics Perfect security: Shannon's lower bound & the Vernam cipher (one-time pad) Pseudorandom generators (a.k.a. stream ciphers): definition, discrete log problem, and Blum-Micali construction Indistinguishability-based definition and composability theorem for pseudorandom generators Integer factorization, Chinese remainder theorem, and Blum-Blum-Shub pseudorandom generator Intuition and first examples of public-key encryption: RSA, Rabin. Definition of security. Encrypting long messages with RSA, Blum-Goldwasser and PKCS #1 Brief history. Diffie-Hellman key agreement, decisional Diffie-Hellman assumption, and ElGamal encryption Introduction to one-way and trapdoor functions, hardcore bits, Goldreich-Levin construction. Definition of digital signatures. Signature schemes and hash functions. Merkle trees. Random oracle model. Full-domain hash RSA and Rabin Symmetric ciphers and message authentication codes Zero-Knowledge proofs Secret sharing Multiparty computation 11/22/2018 Gene Itkis, CS538 Crypto

Topics (coarse grain) Perfect Info-Theoretic Security Pseudo-Randomness (definitions and constructions) Generators & Functions Computational Security – definitions & constructions Encryption, Signatures One-Way & Trap-Door functions (integrated above) Hashing: collision-resistance, random oracle Extra: ZKP, multi-party computation 11/22/2018 Gene Itkis, CS538 Crypto

How (and why) Rigorous: formal definitions and proofs Often the defined goals will look impossible to achieve, but we’ll prove that our constructions satisfy such strong definitions (under some reasonable assumptions) Explicit: precise formal assumptions Unified: theoretical and applied together Though focus is more on theory, this theory is directly relevant to applications Background reviewed in the book’s Appendices Big-O, number-theoretic algorithms, reductions, complexity 11/22/2018 Gene Itkis, CS538 Crypto

“Generic Template” Functional definition Security definition “modules” and “interfaces” Security definition Possibly many for the functional definition Construction Typically many Security proof For a <construction – security definition> pair 11/22/2018 Gene Itkis, CS538 Crypto

Information-Theoretic Security: Perfect secrecy & One-Time Pad Let’s dive in! 11/22/2018 Gene Itkis, CS538 Crypto