Secure Network Communications
Tutorial
Part I Introduction to Cryptography |
Contents:
Recommended literature, basic definitions and terminology, Cryptanalysis:
fundamental assumptions, types of attacks, redundancy/entropy of natural language
texts, Shannon: principles of confusion and diffusion - substitution and
transposition, perfect secrecy - one-time pads, Symmetric or secret-key
cyptosystems: block ciphers, electronic code book mode (ECB), cipher
block chaining mode (CBC), output feedback mode (OFB), popular block
ciphers, digital encryption standard (DES), Feistel networks, advanced encryption standard (AES),
stream ciphers (linear feedback registers, RC4).
Distribution Format:
|
Part II Public Key Cryptosystems |
Contents:
Secure key distribution problem, public key cryptography, mathematical
operations in finite fields, RSA public
key cryptosystem, RSA-155 challenge, RSA key generation, RSA encryption
and decryption, efficient exponentiation of large numbers, how to find
large prime numbers, Diffie-Hellman key-exchange algorithm.
Distribution Format:
|
Part III Authentication and Integrity |
Contents:
Message integrity, message digests, popular hash functions (MD5, SHA),
keyed hash functions, message authentication codes (MACs), RSA digital
signatures, forging documents, the birthday attack against hash functions,
challenge/response authentication protocols, certificates, webs of trust,
hierarchical chains of trust, X.509 certificate structure, handling by
Netscape/Internet Explorer, public key infrastructure (PKI).
Distribution Format:
|
Part IV IP Security |
Contents:
Authentication header (AH),
encapsulated security payload (ESP), virtual private networks (VPN),
transport/tunnel mode, internet key exchange (IKE), Diffie-Hellman
key-exchange, perfect forward secrecy, IKE main/quick mode, security
associations, VPN products.
Distribution Format:
|
Part V Secure Network Applications |
Contents:
Secure e-mail (S/MIME): MIME multipart format, multipart/signed
format, PKCS#7 format, mail signing/encryption. Secure sockets layer protocol
(SSL): SSL record protocol layer, SSL handshake protocol, transport layer security protocol (TLS),
implemented versions (SSL v.2, SSL v.3, TLS 1.0), SSL
secured protocols (https, etc.).
Distribution Format:
|
Part 6 The Elliptic Curve Cryptosystem |
Contents:
What are elliptic curves, what is an algebraic group, point addition
and point doubling,
Distribution Format:
|
|
This five-week course is currently held at the
Zurich University of Applied Sciences
in Winterthur, Switzerland.
|
|