KING FAHD UNIVERSITY OF PETROLEUM & MINERALS
COLLEGE OF
COMPUTER SCIENCES & ENGINEERING
COMPUTER ENGINEERING DEPARTMENT
COE 509: Applied Cryptosystems: Techniques and Architectures
Instructor Dr.
Adnan Gutub. Office: 22/145
Phone: 1723 Email: gutub@kfupm.edu.sa
Term 062
Catalogue
Description:
Introduction to
encryption and information hiding.
Mathematical Foundation
of Cryptography.
Private and Public
key Cryptosystems.
Key Protocol and
Management.
Ciphers.
Advanced Encryption
Standard.
Digital Signatures.
Elliptic Curve
Cryptosystems.
Architectures of
Cryptosystems and Processors.
Prerequisite:
Consent of Instructor.
Helpful
Books:
1. Handbook
of Applied Cryptography, Alfred J. Menezes, Paul C.
van Oorschot and Scott A. Vanstone
2.
Modern
Cryptography Protect Your Data with Fast Block Ciphers, Nik
Goots, Boris Izotov, Alex Moldovyan, Nik Moldovyan
3.
Cryptography
Theory and Practice, Doug Stinson
Grading
Policy:
Exams 30%~40%
Assignments 60%~70% (three types)
1. Steganography
Assignment
Week 3: Proposed Idea and
References to be submitted.
Week 6: Final Report and
presentation.
2. Crypto
Project Assignment (topic based on interest)
Week 9: Proposed Idea and
References to be submitted.
Week 13: Final Report and Final
presentation.
3. Ad Hoc
Assignments, Quizzes and Presentations.
Covered
Lectures Topics :
·
Introduction (Week
1)
o
Concepts; Definitions; Encryption & Info hiding
·
Steganography (Week
1-2)
o
Applications; Main aspects; Difference: Cryptography and Watermarking;
Stego model; Greyscale images & Text steganography
·
Overview of Cryptography (Week
2-3)
o Terminology; Crypto model & Attack means; Kerckhkoffs principle; Mono-alphabetic ciphers; Modern ciphers property; Symmetric/Asymmetric key cryptography & applications; Public Crypto Spoofing Attack (Man-in-middle); Key management issues
o Hill ciphers; Modulo arithmetic properties; Detailed example of cryptography using modulo computations
o Authentication; Aspects of PKC; Key space & Brute force; Unbreakable Cryptosystem; Crypto Applications; Hash Functions; Security Risks & Attacks
·
Classic Cryptosystems (Week 4-5)
o Modulo & Ring characteristics; Properties of Good Cryptosystems
o One-Time Pad; Random number generation; Stream Ciphers; LFSR; Nonlinear Combination Generator (Geffe generator); Synchronous/Asynchronous Stream Ciphers; SEAL
·
RSA & Number Theory (Week 6-7)
o Diffie Hellman Key distribution; trapdoor one-way function; PKC & Standards; Divisibility; Primes; GCD; Euclidean algorithm & its extension; Congruence Classes; Chinese Remainder Theorem; Euler’s theorem; Exponentiation; Primitive roots
o RSA encryption & decryption; RSA digital signature; RSA Key lengths; RSA security & attack
o Finite Fields; Group properties - abelian - cyclic; Order of groups; Galois Fields; Polynomial Arithmetic in general and in GF(2n)
· RSA Hardware Architectures (Week 8-9)
o RSA Implementations Principles; 90’s RSA & Modular arithmetic designs; RSA exponentiation (MSB first & LSB first) algorithms & architectures comparisons
o RSA Multiplication; Montgomery Multiplication Princeples; Montgomery Multiplication Hardware algorithms & architectures; Expandable designs; Scalable designs; Improving multiplication through fast adders.
·
Elliptic Curve Cryptography (ECC) (Week 10-11)
o What & Why ECC?; Benefits, Applications, Equivalent key sizes; Security Strength
o Some theory of Elliptic Curves (EC); EC & finite fields; EC Point properties & operations; EC Scalar multiplications; EC Discrete Logarithm Problem (ECDLP); EC Generator Point
o ECC Application: ECDH, EC Encryption/Decryption, ECDSA, ElGamal ECC
o EC Projective Coordinate Systems
· ECC Hardware Issues (Week 11-13)
o GF(p) & GF(2k) ECC Architecture Designing: Single/Multiple/Pipelined Multiplier Desings
o Montgomery Modular Inverse Hardware & Scalability; Multi-bit shifting Invsrsion Hardware; Unified Montgomery Inversion in GF(p) & GF(2k)
·
Symmetric Key Cryptosystems (Week 13-14)
o Block Cipher Modes: Electronic Codebook, Cipher Block Chaining (CBC), Cipher Feedback (CFB); Evaluating block ciphers; DES Encryption/Decryption; AES Encryption/Decryption
· Crypto Remarks (Week 14-15)
o
Public Key Management
o
Cryptography: What Makes it Applied?
o
Students Research Presentations