Cryptography and Network Security

Cryptography and Network Security

Cryptography and Network Security

Lessons

  1. Introduction

  2. Overview on Modern Cryptography

  3. Introduction to Number Theory

  4. Probability and Information Theory

  5. Classical Cryptosystems

  6. Cryptanalysis of Classical Ciphers

  7. Shannons Theory

  8. Shannons Theory (Contd...1)

  9. Shannons Theory (Contd...2)

  10. Symmetric Key Ciphers

  11. Block Cipher Standards (DES)

  12. Block Cipher Standards (AES)

  13. Block Cipher Standards (AES) (Contd.)

  14. Linear Cryptanalysis

  15. Differential Cryptanalysis

  16. Few other Cryptanalytic Techniques

  17. Stream Ciphers

  18. Overview on S-Box Design Principles

  19. Modes of Operation of Block Ciphers

  20. Stream Ciphers (Contd...1)

  21. Stream Ciphers (Contd...2)

  22. Cryptographic Hash Functions

  23. Cryptographic Hash Functions (Contd...1)

  24. Pseudorandomness

  25. Cryptographic Hash Functions (Contd...2)

  26. Why do we need to study cryptography?

  27. What is the communication game?

  28. What is the protocols concept and what are the properties of function f(x)-1 and f(x-2)?

  29. Can we look at security analysis and an example?

  30. What are the problem arising with the new concept?

  31. What is the assumed protocol?

  32. How can we calculate the success probability?

  33. What is coin flipping over telephone?

  34. How can we get the function f(x)?

  35. What is the probability of cheating case 1 and 2?

  36. What is planning strategy?

  37. What is the magic function?

  38. What are the the three goals of modern cryptography?

  39. What are confidentiality, integrity, availability and mechanism?

  40. What are cryptographic attacks?

  41. What is the objective of crypt analysis?

  42. What is the non cryptanalytic attack and confidentiality threat?

  43. What are the threat to integrity 1, 2 and 3 and threat of availability?

  44. What is security mechanism?

  45. What is digital signature and authencation and more on security mechanism?

  46. What is the relation ship between service and mechanism?

  47. What are active and passive attacks?

  48. What are cryptographic algorithms and what are steganography / modern techniques?

  49. What are security services?

  50. What are congruences and their properties?

  51. What is equivalence and residue class of modulo m and examples of class 1 class and 2?

  52. Can we look at an example on the given theorem?

  53. What is monoid and example on neutral elements?

  54. What are zero divisors?

  55. What are residue class ring and unit group?

  56. What is Fermat's Little Theorem?

  57. What is theorem on equilance and residue?

  58. What is field theory (semigroups) and field theory (implication)?

  59. What are Field and Euler's Totient Function and properties of ? and an important result?

  60. What is the importance of Probability and cipher uncertainity?

  61. Law of large numbers 1?

  62. What is the Birthday paradox problem, actual problem and computing problem 1 and 2?

  63. What is probability distribution of random variables and what is Uniform and Binomial distribution?

  64. What is an application of the paradox problem?

  65. What is Floyd's cycle finding algorithm?

  66. What are probability definitions (statistical and classical)?

  67. What is Semantic Security and the notions of security and computational security?

  68. What is the law of large numbers 2?

  69. How can we measure information and entropy?

  70. Definitions behind cypher designs 1 and 2?

  71. What are the properties required for encryption and what is substitution cypher?

  72. What is Classical Cryptography and simple substitution?

  73. What is the affine cypher and its inverse?

  74. What are monoalphabetic, polyalphabetic and vigenere ciphers?

  75. What is generalized affine cipher and an example of it?

  76. What are hill ciphers and permutation ciphers?

  77. What are some Important Results 1 and 2?

  78. What is Kerchoffs Principle and what is Cryptographic Communication?

  79. What is Kerckhoff's principle and the models of cryptanalysis 1 and 2?

  80. What is statistical analysis?

  81. What is index of coincidence 1?

  82. What is cryptanalysis of a monoalphabetic, affine and vigenere cipher?

  83. What is Kasiski test?

  84. What is index of coincidence 2?

  85. What are mutual index of coincidence?

  86. What is computing mutual index?

  87. Can we look at two examples of vignere cipher?

  88. What is cryptoanalysis of hill cipher?

  89. What is Shannons theory and unconditional security?

  90. Can we look at example on shift cipher with perfect secrecy and its mathemetical formulation?

  91. What are aprior and aposteriori probabilities?

  92. What is an example on perfect secrecy 1 and 2 and generalisation of example?

  93. What is perfect secrecy 1 and 2?

  94. What are cryptographic properties 1 and 2?

  95. What is the theorem on perfect secrecy?

  96. What is one time pad, uncoditionally secured scheme and practical problems?

  97. What is Huffman encoding with example?

  98. Can we look at more results on entropy?

  99. What is unicity, brute force attack, spurious keys, entropy of plain text and redundance?

  100. Can we revisit entropy?

  101. Can we compare perfect cipher with ideal cipher?

  102. What is the proof of the theorem 1 and 2?

  103. What is the lower bound of equivocation of key?

  104. What is protection against brute force?

  105. What are spurious keys, second order approximation and redundancy?

  106. Can we look at example on endomorphic cipher?

  107. What is the lower bound of spurious key?

  108. What are possible keys?

  109. What is unicity distance and unicity distance for substitution ciphers?

  110. What is the proof of commutative ciphers?

  111. What are idempotent ciphers and what are the conclusions drawn?

  112. What is the concept of rounds?

  113. What is symmetric key setting and types of symmetric key ciphers?

  114. What are permutation ciphers and partial-size key ciphers 1 and 2?

  115. What are diffusion (P) boxes, S box and other components?

  116. What are the components of modern block ciphers?

  117. What is diffusion and confusion data flow diagram?

  118. What are practical ciphers (feistel cipher)?

  119. What is Feistel permutation?

  120. What are the properties of EXOR?

  121. What are full size key ciphers?

  122. What are data encryption standards and DES numerology?

  123. What are initial permutations and DES expansion table?

  124. What is S box table with decimal values and what are the properties of S box?

  125. Some important points about DES and an exercise?

  126. What are weak keys?

  127. What is DES subkey?

  128. What is meet in the middle attack and security of 2DES?

  129. What is sample round key generation and multiple DES?

  130. What are finite fields and complex fields?

  131. What is polynomial over a field?

  132. What are the operations on a polynomial?

  133. Can we look at an addition example?

  134. What is multiplication operation, irreducible polynomial and an example of multuplication?

  135. What is the concept of a generator( Fernets Little theorem)?

  136. What is the proof of the theorem?

  137. What is AES and Rijndael algorithm?

  138. What is the difference between Rijndael and AES?

  139. What are mix columns?

  140. What is the the AES Sbox and AES Sbox Affien mapping?

  141. What is the AES key scheduling?

  142. What is the round constant?

  143. when nk>6 and an example on different key sizes?

  144. What is the algorithm of encryption process?

  145. What is the algorithm of decryption process?

  146. What is key expansion?

  147. What is the key scheduling algorithm?

  148. How can we make AES computation fast, some furthur reading and an exercise?

  149. What is inverse cipher (decription)?

  150. How can we push a linear transformation using a XOR, steps for a two round variant and implementation on modern processors?

  151. What happens when the number fo rounds of cipher are fixed?

  152. What is cipher transformation?

  153. What is the definition and algorithm of SPN ciphers?

  154. What is piling up Lemma and generalised Lemma?

  155. Can we look at an example of Gpig cipher and modification of SPN structure and key scheduling of the cipher?

  156. What is linear cryptanalysis ?

  157. What is the linear approximation of S box and S box in terms of random variables?

  158. What is representing the approximations?

  159. What is linear attack explanation 1 and 2 and what is the attack?

  160. What is linear approxiamtion table?

  161. What are the key points of Differential Cryptanalysis?

  162. Can we have a recap of Gpig example?

  163. What is the informal working of the attack and obtaining differential characteristics fo the S box?

  164. What is the delta set and an example set?

  165. What is a non uniform output distribution of XOR's of a S box and difference distribution table and propagation ratio?

  166. Can we look at an example of differential trail?

  167. How can we obtain differential for 3 rounds and a real attack?

  168. How can we have an immunty against DC, an exercise and furthur reading?

  169. What is differential trail?

  170. What are common cryptanalytic techniques and a cap of differential cryptanalysis?

  171. What is the M layer?

  172. Can we look at an example of Boomerang attack?

  173. What is Boomerang attack?

  174. How can we obtain full round characteristics and the actual attack?

  175. Can we look at differential analysis of Phi function 1?

  176. Can we look at differential analysis of Phi function 2?

  177. How can we find k1 key and other keys?

  178. What is the square attack on 4 round AES and the invariance of the active attack?

  179. What is S Box?

  180. What is boolean function?

  181. Can we look at compact representation of linear functions?

  182. What is the effect of input transformation and a strict avalanche criteria?

  183. What is non linearity 1 and 2?

  184. a strict avalanche criteria?

  185. What is boolean function satisfying SAC?

  186. Can we look at explanation to boolean functions and scalar product of sequences?

  187. Can we look at an example of a boolean function satisfying SAC?

  188. What is Bent function and its example?

  189. How can we create a balanced non linear function?

  190. What is the need for modes of block ciphers and what is electronic code book?

  191. How can the ciphertext be stolen 1?

  192. How can the ciphertext be stolen 2?

  193. What is output feedback mode and counter mode

  194. What is cipher block chaining?

  195. How do modern day modes function and what are tweakable modes

  196. What are IV based attacks?

  197. What are the properties of modes?

  198. What is watermark attack

  199. What is error propabation in case of CBC, its disadvantages and certain points?

  200. Can we compare block with stream ciphers and what is one time pad

  201. What are synchronous stream ciphers?

  202. What are self synchronisation stream ciphers and their properties

  203. What are the properties of synchronous stream ciphers and its model?

  204. Can we look at an example of LFSR and periodicity of its sequences

  205. What is feedback shift register and linear feedback shift register?

  206. How can we reconstruct the LFSR (an example)?

  207. Some basic concepts related to Stream Ciphers and what is the LFSR structure

  208. How can we generate a sequence and theorem of LFSR

  209. What is the proof for the theorem 1 and 2

  210. What is Berlekamp Masseys algorithm?

  211. Can we look at an example

  212. How can we prove the induction hypothesis

  213. What is linear complexity and considering another lemma

  214. What is discrepancy and how can it be corrected?

  215. What is recursive construction of polynomial

  216. What are non linear feedback shift registers

  217. What is de bruijn sequence and an example of de Bruijn generator

  218. What is non linear combination generator and an example using Geffe generator

  219. How can we convert LFSR to a de Brujin FSR and what are stream ciphers based on LFSR?

  220. What are correlation attacks

  221. What is correlation immunity

  222. What is summation generator, clock controlled generator and shrinking generator and what are modern stream ciphers

  223. What is the usefulness of Pseudorandomnessin cryptography and what is random bit generator?

  224. What is a pseudorandom bit generator and random tests

  225. What is polynomial statistical test and next bit test and the universality of the next bit test

  226. What is random bit test and de-skewing

  227. What is FIPS pseudo random bit generator

  228. What are the five basic tests

  229. What is normal distribution and chi square distribution

  230. What is hypothesis testing

  231. What is he RSA bit PRBG and Blum Blum Shub Generator

  232. What is data integrity, applications of hash function and what is a keyed hash function

  233. What is a definition of cryptographci hash function and how do we define a preimage problem

  234. What is collision problem and the random oracle model

  235. What is an example of non ideal hash function

  236. What is independence theorem and what is algorithm in the random oracle model

  237. What is the algorithm of find-preimage and find second preimage

  238. What is algorithm find collision and comparison of security criteria

  239. What is the second reduction

  240. What is the first reduction

  241. What are the proof on the assumption 1

  242. What is the proof on the assumption 2

  243. Can we look at the construction of iterated hash function

  244. What is the algorithm

  245. What is merkel damgard construction

  246. What is optimal output construction and a typical preprocessing step

  247. What is the proof of collision resistance

  248. What is the proof of collision resistance (assuming different cases)

  249. Can we conclude considering t=1 case

  250. What are the different theorems applicable

  251. What is the iterated hash function and ideal hash function

  252. What is Joux's attack

  253. What are multi collisions 1 and 2

  254. What is the multi collision attack and can we look at a demo on meaningful collisions

  255. What is the problem with meaningful collisions and weaker collissions

  256. What is the attack and how can we forge MAC

  257. What is commitment scheme and its pitfalls

  258. Can we look at MAC construction example

  259. How can we calculate success probability experimentally?

No Comments

Give a comment