Secure Network Communications
Tutorial
Part I Introduction to Cryptography 
Contents:
Recommended literature, basic definitions and terminology, Cryptanalysis:
fundamental assumptions, types of attacks, redundancy/entropy of natural language
texts, Shannon: principles of confusion and diffusion  substitution and
transposition, perfect secrecy  onetime pads, Symmetric or secretkey
cyptosystems: block ciphers, electronic code book mode (ECB), cipher
block chaining mode (CBC), output feedback mode (OFB), popular block
ciphers, digital encryption standard (DES), Feistel networks, advanced encryption standard (AES),
stream ciphers (linear feedback registers, RC4).
Distribution Format:

Part II Public Key Cryptosystems 
Contents:
Secure key distribution problem, public key cryptography, mathematical
operations in finite fields, RSA public
key cryptosystem, RSA155 challenge, RSA key generation, RSA encryption
and decryption, efficient exponentiation of large numbers, how to find
large prime numbers, DiffieHellman keyexchange algorithm.
Distribution Format:

Part III Authentication and Integrity 
Contents:
Message integrity, message digests, popular hash functions (MD5, SHA),
keyed hash functions, message authentication codes (MACs), RSA digital
signatures, forging documents, the birthday attack against hash functions,
challenge/response authentication protocols, certificates, webs of trust,
hierarchical chains of trust, X.509 certificate structure, handling by
Netscape/Internet Explorer, public key infrastructure (PKI).
Distribution Format:

Part IV IP Security 
Contents:
Authentication header (AH),
encapsulated security payload (ESP), virtual private networks (VPN),
transport/tunnel mode, internet key exchange (IKE), DiffieHellman
keyexchange, perfect forward secrecy, IKE main/quick mode, security
associations, VPN products.
Distribution Format:

Part V Secure Network Applications 
Contents:
Secure email (S/MIME): MIME multipart format, multipart/signed
format, PKCS#7 format, mail signing/encryption. Secure sockets layer protocol
(SSL): SSL record protocol layer, SSL handshake protocol, transport layer security protocol (TLS),
implemented versions (SSL v.2, SSL v.3, TLS 1.0), SSL
secured protocols (https, etc.).
Distribution Format:

Part 6 The Elliptic Curve Cryptosystem 
Contents:
What are elliptic curves, what is an algebraic group, point addition
and point doubling,
Distribution Format:


This fiveweek course is currently held at the
Zurich University of Applied Sciences
in Winterthur, Switzerland.

