KING FAHD UNIVERSITY OF PETROLEUM & MINERALS
COLLEGE OF COMPUTER SCIENCES & ENGINEERING

COMPUTER ENGINEERING DEPARTMENT

 

COE 509: Applied Cryptosystems: Techniques and Architectures

 

Instructor   Dr. Adnan Gutub  Email:  adnangutub 'at' gmail.com

 

Catalogue Description:

Introduction to encryption and information hiding.

Mathematical Foundation of Cryptography.

Private and Public key Cryptosystems.

Key Protocol and Management.

Ciphers.

Advanced Encryption Standard.

Digital Signatures.

Elliptic Curve Cryptosystems.

Architectures of Cryptosystems and Processors.

 

Prerequisite:

Consent of Instructor.

 

Helpful Books:

1.      Handbook of Applied Cryptography, Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone

2.      Modern Cryptography Protect Your Data with Fast Block Ciphers, Nik Goots, Boris Izotov, Alex Moldovyan, Nik Moldovyan

3.      Cryptography Theory and Practice, Doug Stinson

 

Grading Policy:

Exams & Quizzes 30%

·         Quizzes

·         Midterm

·         Final

Assignments 20%

Steganography Paper 20%

Week 3: Proposed Idea & References to be submitted

Week 6: Report

Week 7: Presentation

Crypto Project 30%

(topic based on interest)

Week 9: Proposed Idea and References to be submitted

Week 13: Report

Week 15: Presentation

 

Covered Lectures Topics :

·         Introduction (Week 1)

o       Concepts; Definitions; Encryption & Info hiding

·         Steganography (Week 1-2)

o       Applications; Main aspects; Difference: Cryptography and Watermarking; Stego model; Greyscale images steganography

o       S-tools; RGB image steganography; Pixel indictor technique; Text steganography; Arabic text steganography; Kashida & Diacritics Stego Methods. 

·         Overview of Cryptography (Week 3)

o       Terminology; Crypto model & Attack means; Kerckhkoffs principle; Mono-alphabetic ciphers; Modern ciphers property; Symmetric/Asymmetric key cryptography & applications; Public Crypto Spoofing Attack (Man-in-middle); Key management issues

o       Authentication; Aspects of PKC; Key space & Brute force; Unbreakable Cryptosystem; Crypto Applications; Hash Functions; Security Risks & Attacks

·         Classic Cryptosystems  (Week 4-5)

o       Modulo & Ring characteristics; Modulo arithmetic properties

o       Substitution; Transposition; Enigma Machine; Shift; Affine; Vigenere

o       Block (Hill); Detailed example of cryptography using modulo computations

o       Properties of Good Cryptosystems; Vernam (one time pad)

o       Random number generation; Stream Ciphers; LFSR; Nonlinear Combination Generator (Geffe generator); Synchronous/Asynchronous Stream Ciphers; SEAL

·         RSA & Number Theory  (Week 6-8)

o       Diffie Hellman Key distribution; trapdoor one-way function; PKC & Standards;  Divisibility; Primes; GCD; Euclidean algorithm & its extension; Congruence Classes; Chinese Remainder Theorem; Euler’s theorem; Exponentiation; Primitive roots

o       RSA encryption & decryption; RSA digital signature; RSA Key lengths; RSA security & attack

o       Finite Fields; Group properties - abelian - cyclic; Order of groups; Galois Fields; Polynomial Arithmetic in general and in GF(2n)

·         Steganography Paper Presentations (Week 9)

·         RSA Hardware Architectures  (Week 9-10)

o       RSA Implementations Principles; 90’s RSA & Modular arithmetic designs; RSA exponentiation (MSB first & LSB first) algorithms & architectures comparisons

o       RSA Multiplication; Montgomery Multiplication Princeples; Montgomery Multiplication Hardware algorithms & architectures; Expandable designs; Scalable designs; Improving multiplication through fast adders.

·         Elliptic Curve Cryptography (ECC) (Week 11-12)

o       What & Why ECC?; Benefits, Applications, Equivalent key sizes; Security Strength

o       Some theory of Elliptic Curves (EC); EC & finite fields; EC Point properties & operations; EC Scalar multiplications;  EC Discrete Logarithm Problem (ECDLP); EC Generator Point

o       ECC Application: ECDH, EC Encryption/Decryption, ECDSA, ElGamal ECC

o       EC Projective Coordinate Systems

·         ECC Hardware Issues (Week 13)

o       GF(p) & GF(2k) ECC Architecture Designing: Single/Multiple/Pipelined Multiplier Desings

o       Montgomery Modular Inverse Hardware & Scalability; Multi-bit shifting Invsrsion Hardware; Unified Montgomery Inversion in GF(p) & GF(2k)

·         Symmetric Key Cryptosystems (Week 14)

o       DES Encryption/Decryption; AES Encryption/Decryption

·         Crypto Remarks (Week 15)

o       Students Research Presentations

 

Same Course Previous Work:

Term 072 (Second Term 2007): PDF HTML

Students Work Samples:

Steganography:

o        Mohammad Tanvir Parvez, “RGB Intensity Based Variable-Bits Image Steganography”

§         Paper presented and published in the 3rd IEEE Asia-Pacific Services Computing Conference (APSCC 2008),Yilan, Taiwan, 9-12 December 2008.    Invitation Abstract Paper ppt pdf

o       Ayed Al-Qahtani, and Abdulaziz Tabakh, “Triple-A: Secure RGB Image Steganography Based on Randomization”

§       Paper presented and published in the 7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2009), Pages: 400-403, Rabat, Morocco, 10-13 May 2009. Acceptance Abstract-(html pdf) Paper Presentation-(ppt pdf)

o       Fahd  Al-Haidari,  Khalid  Al-Kahsah, and   Jameel Hamodi, “Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions”

§       Paper presented and published in the 7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2009), Pages: 396-399, Rabat, Morocco, 10-13 May 2009. Acceptance Abstract-(html pdf) Paper Presentation-(ppt pdf)

Term 062 (Second Term 2006): PDF HTML

Students Work Samples:

Steganography:

o        Farhan Khan, “Message Concealment Techniques using Image based Steganography”

§         Research files (complete folder)

§         Paper published in The 4th IEEE GCC Conference and Exhibition, Gulf International Convention Centre, Manamah, Bahrain, 11-14 November 2007.    Abstract    Paper   

o        Mohammed Aabed, Sameh Awaideh, Abdul-Rahman Elshafei, “Arabic Diacritics Based Steganography”

§         Research files (complete folder)

§         IEEE International Conference on Signal Processing and Communications (ICSPC 2007), Pages: 756-759, Dubai, UAE, 24-27 November 2007.    Abstract    Paper

o        Yousef Elarian, Sameh Awaideh, Aleem Alvi, "Arabic Text Steganography Using Multiple Diacritics"

§         Research files (complete folder)

§         WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, UNIVERSITY OF SHARJAH, SHARJAH, U.A.E. 18 – 20 MARCH 2008. Abstract    Paper

o        Mahmoud Ankeer, Muhammad Abu-Ghalioun, Abdulrahman Shaheen, Aleem Alvi, "Pixel Indicator High Capacity Technique For RGB Image Based Steganography"

§         Research files (complete folder)

§         WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, UNIVERSITY OF SHARJAH, SHARJAH, U.A.E. 18 – 20 MARCH 2008. Abstract    Paper