Cryptography and Network Security
Home Cryptography and Network Security
Cryptography and Network Security
Lessons
Overview on Modern Cryptography
Introduction to Number Theory
Probability and Information Theory
Cryptanalysis of Classical Ciphers
Shannons Theory (Contd...1)
Shannons Theory (Contd...2)
Block Cipher Standards (DES)
Block Cipher Standards (AES)
Block Cipher Standards (AES) (Contd.)
Differential Cryptanalysis
Few other Cryptanalytic Techniques
Overview on S-Box Design Principles
Modes of Operation of Block Ciphers
Stream Ciphers (Contd...1)
Stream Ciphers (Contd...2)
Cryptographic Hash Functions
Cryptographic Hash Functions (Contd...1)
Cryptographic Hash Functions (Contd...2)
Why do we need to study cryptography?
What is the communication game?
What is the protocols concept and what are the properties of function f(x)-1 and f(x-2)?
Can we look at security analysis and an example?
What are the problem arising with the new concept?
What is the assumed protocol?
How can we calculate the success probability?
What is coin flipping over telephone?
How can we get the function f(x)?
What is the probability of cheating case 1 and 2?
What is planning strategy?
What is the magic function?
What are the the three goals of modern cryptography?
What are confidentiality, integrity, availability and mechanism?
What are cryptographic attacks?
What is the objective of crypt analysis?
What is the non cryptanalytic attack and confidentiality threat?
What are the threat to integrity 1, 2 and 3 and threat of availability?
What is security mechanism?
What is digital signature and authencation and more on security mechanism?
What is the relation ship between service and mechanism?
What are active and passive attacks?
What are cryptographic algorithms and what are steganography / modern techniques?
What are security services?
What are congruences and their properties?
What is equivalence and residue class of modulo m and examples of class 1 class and 2?
Can we look at an example on the given theorem?
What is monoid and example on neutral elements?
What are residue class ring and unit group?
What is Fermat's Little Theorem?
What is theorem on equilance and residue?
What is field theory (semigroups) and field theory (implication)?
What are Field and Euler's Totient Function and properties of ? and an important result?
What is the importance of Probability and cipher uncertainity?
What is the Birthday paradox problem, actual problem and computing problem 1 and 2?
What is probability distribution of random variables and what is Uniform and Binomial distribution?
What is an application of the paradox problem?
What is Floyd's cycle finding algorithm?
What are probability definitions (statistical and classical)?
What is Semantic Security and the notions of security and computational security?
What is the law of large numbers 2?
How can we measure information and entropy?
Definitions behind cypher designs 1 and 2?
What are the properties required for encryption and what is substitution cypher?
What is Classical Cryptography and simple substitution?
What is the affine cypher and its inverse?
What are monoalphabetic, polyalphabetic and vigenere ciphers?
What is generalized affine cipher and an example of it?
What are hill ciphers and permutation ciphers?
What are some Important Results 1 and 2?
What is Kerchoffs Principle and what is Cryptographic Communication?
What is Kerckhoff's principle and the models of cryptanalysis 1 and 2?
What is statistical analysis?
What is index of coincidence 1?
What is cryptanalysis of a monoalphabetic, affine and vigenere cipher?
What is index of coincidence 2?
What are mutual index of coincidence?
What is computing mutual index?
Can we look at two examples of vignere cipher?
What is cryptoanalysis of hill cipher?
What is Shannons theory and unconditional security?
Can we look at example on shift cipher with perfect secrecy and its mathemetical formulation?
What are aprior and aposteriori probabilities?
What is an example on perfect secrecy 1 and 2 and generalisation of example?
What is perfect secrecy 1 and 2?
What are cryptographic properties 1 and 2?
What is the theorem on perfect secrecy?
What is one time pad, uncoditionally secured scheme and practical problems?
What is Huffman encoding with example?
Can we look at more results on entropy?
What is unicity, brute force attack, spurious keys, entropy of plain text and redundance?
Can we compare perfect cipher with ideal cipher?
What is the proof of the theorem 1 and 2?
What is the lower bound of equivocation of key?
What is protection against brute force?
What are spurious keys, second order approximation and redundancy?
Can we look at example on endomorphic cipher?
What is the lower bound of spurious key?
What is unicity distance and unicity distance for substitution ciphers?
What is the proof of commutative ciphers?
What are idempotent ciphers and what are the conclusions drawn?
What is the concept of rounds?
What is symmetric key setting and types of symmetric key ciphers?
What are permutation ciphers and partial-size key ciphers 1 and 2?
What are diffusion (P) boxes, S box and other components?
What are the components of modern block ciphers?
What is diffusion and confusion data flow diagram?
What are practical ciphers (feistel cipher)?
What is Feistel permutation?
What are the properties of EXOR?
What are full size key ciphers?
What are data encryption standards and DES numerology?
What are initial permutations and DES expansion table?
What is S box table with decimal values and what are the properties of S box?
Some important points about DES and an exercise?
What is meet in the middle attack and security of 2DES?
What is sample round key generation and multiple DES?
What are finite fields and complex fields?
What is polynomial over a field?
What are the operations on a polynomial?
Can we look at an addition example?
What is multiplication operation, irreducible polynomial and an example of multuplication?
What is the concept of a generator( Fernets Little theorem)?
What is the proof of the theorem?
What is AES and Rijndael algorithm?
What is the difference between Rijndael and AES?
What is the the AES Sbox and AES Sbox Affien mapping?
What is the AES key scheduling?
What is the round constant?
when nk>6 and an example on different key sizes?
What is the algorithm of encryption process?
What is the algorithm of decryption process?
What is the key scheduling algorithm?
How can we make AES computation fast, some furthur reading and an exercise?
What is inverse cipher (decription)?
How can we push a linear transformation using a XOR, steps for a two round variant and implementation on modern processors?
What happens when the number fo rounds of cipher are fixed?
What is cipher transformation?
What is the definition and algorithm of SPN ciphers?
What is piling up Lemma and generalised Lemma?
Can we look at an example of Gpig cipher and modification of SPN structure and key scheduling of the cipher?
What is linear cryptanalysis ?
What is the linear approximation of S box and S box in terms of random variables?
What is representing the approximations?
What is linear attack explanation 1 and 2 and what is the attack?
What is linear approxiamtion table?
What are the key points of Differential Cryptanalysis?
Can we have a recap of Gpig example?
What is the informal working of the attack and obtaining differential characteristics fo the S box?
What is the delta set and an example set?
What is a non uniform output distribution of XOR's of a S box and difference distribution table and propagation ratio?
Can we look at an example of differential trail?
How can we obtain differential for 3 rounds and a real attack?
How can we have an immunty against DC, an exercise and furthur reading?
What is differential trail?
What are common cryptanalytic techniques and a cap of differential cryptanalysis?
Can we look at an example of Boomerang attack?
What is Boomerang attack?
How can we obtain full round characteristics and the actual attack?
Can we look at differential analysis of Phi function 1?
Can we look at differential analysis of Phi function 2?
How can we find k1 key and other keys?
What is the square attack on 4 round AES and the invariance of the active attack?
What is boolean function?
Can we look at compact representation of linear functions?
What is the effect of input transformation and a strict avalanche criteria?
What is non linearity 1 and 2?
a strict avalanche criteria?
What is boolean function satisfying SAC?
Can we look at explanation to boolean functions and scalar product of sequences?
Can we look at an example of a boolean function satisfying SAC?
What is Bent function and its example?
How can we create a balanced non linear function?
What is the need for modes of block ciphers and what is electronic code book?
How can the ciphertext be stolen 1?
How can the ciphertext be stolen 2?
What is output feedback mode and counter mode
What is cipher block chaining?
How do modern day modes function and what are tweakable modes
What are IV based attacks?
What are the properties of modes?
What is error propabation in case of CBC, its disadvantages and certain points?
Can we compare block with stream ciphers and what is one time pad
What are synchronous stream ciphers?
What are self synchronisation stream ciphers and their properties
What are the properties of synchronous stream ciphers and its model?
Can we look at an example of LFSR and periodicity of its sequences
What is feedback shift register and linear feedback shift register?
How can we reconstruct the LFSR (an example)?
Some basic concepts related to Stream Ciphers and what is the LFSR structure
How can we generate a sequence and theorem of LFSR
What is the proof for the theorem 1 and 2
What is Berlekamp Masseys algorithm?
Can we look at an example
How can we prove the induction hypothesis
What is linear complexity and considering another lemma
What is discrepancy and how can it be corrected?
What is recursive construction of polynomial
What are non linear feedback shift registers
What is de bruijn sequence and an example of de Bruijn generator
What is non linear combination generator and an example using Geffe generator
How can we convert LFSR to a de Brujin FSR and what are stream ciphers based on LFSR?
What are correlation attacks
What is correlation immunity
What is summation generator, clock controlled generator and shrinking generator and what are modern stream ciphers
What is the usefulness of Pseudorandomnessin cryptography and what is random bit generator?
What is a pseudorandom bit generator and random tests
What is polynomial statistical test and next bit test and the universality of the next bit test
What is random bit test and de-skewing
What is FIPS pseudo random bit generator
What are the five basic tests
What is normal distribution and chi square distribution
What is hypothesis testing
What is he RSA bit PRBG and Blum Blum Shub Generator
What is data integrity, applications of hash function and what is a keyed hash function
What is a definition of cryptographci hash function and how do we define a preimage problem
What is collision problem and the random oracle model
What is an example of non ideal hash function
What is independence theorem and what is algorithm in the random oracle model
What is the algorithm of find-preimage and find second preimage
What is algorithm find collision and comparison of security criteria
What is the second reduction
What is the first reduction
What are the proof on the assumption 1
What is the proof on the assumption 2
Can we look at the construction of iterated hash function
What is merkel damgard construction
What is optimal output construction and a typical preprocessing step
What is the proof of collision resistance
What is the proof of collision resistance (assuming different cases)
Can we conclude considering t=1 case
What are the different theorems applicable
What is the iterated hash function and ideal hash function
What are multi collisions 1 and 2
What is the multi collision attack and can we look at a demo on meaningful collisions
What is the problem with meaningful collisions and weaker collissions
What is the attack and how can we forge MAC
What is commitment scheme and its pitfalls
Can we look at MAC construction example
How can we calculate success probability experimentally?
No Comments