Cryptography Short Course

New Message Reply About this list Date view Thread view Subject view Author view

Robert Hettinga (rah@shipwright.com)
Fri, 2 Apr 1999 06:56:39 -0500


--- begin forwarded text

Date: Thu, 1 Apr 1999 23:09:43 -0500 (EST)
From: Christof Paar <christof@ece.WPI.EDU>
To: "WPI.Crypto.Seminar":;
cc: DCSB <dcsb@ai.mit.edu>
Subject: Cryptography Short Course
Sender: bounce-dcsb@ai.mit.edu
Reply-To: Christof Paar <christof@ece.WPI.EDU>

           Worcester Polytechnic Institute
                 4-Day Short Course
                   Waltham Campus

        APPLIED CRYPTOGRAPHY AND DATA SECURITY

          Seminar Leader: Dr. Christof Paar

This course will provide you with an in-depth understanding of
applied cryptography and information security. Most of today's
information technology applications require security as a central
system feature. Applications such as LAN computer networks,
intranets, E-commerce, database systems, and many www applications
rely heavily on a high degree of system security. This four-day
course will provide you with a solid foundation in state-of-the-art
cryptography and data security.

The course provides you with a balance of cryptographic algorithms,
protocols, standards, and many real-world examples. All cryptography
schemes will be introduced together with up-to-date security
assessments, information on their software and hardware performance,
and remarks on their implementation. At the end of the course you
will have the skills to design, assess, and implement data security
schemes for given applications.

Note: The Applied Cryptography course has been taught to more than
250 technical professionals and graduate students. On-site programs
were delivered at the NASA Lewis Research Center, OH, GTE Government
Systems, MA, and at Philips Research, NY.

                  COURSE OUTLINE

Introduction to Cryptography and Data Security

Overview. Private-Key Cryptosystems. Cryptanalysis.

Private-key Algorithms: Stream Ciphers

Random Number Generators. Synchronous Stream Ciphers and LFSRs.
Attacks. One Time Pad. Unconditional and Computational Security.

Private-key Algorithms: Block Ciphers

DES Functionality and History. DES Implementation: Hardware
and Software. Attacks and Security Estimations. AES and other block
ciphers.

Modes and Variants of Block Ciphers

Operation modes of block ciphers. Multiple encryption. Key whitening.

Introduction to Public-Key Cryptography

Principle. Some Number Theory. Overview of Practical Schemes: RSA,
Diffie-Hellman-type, Elliptic Curves. Public-Key standards (ANSI,
IEEE)

RSA

Cryptosystem. Implementational Aspects. Recent Attacks and Security
Estimations.

Diffie-Hellman-Type Cryptosystems

The generalized discrete logarithm problem. Diffie-Hellman key
exchange. ElGamal encryption. Elliptic curve cryptosystems.

Elliptic Curve Cryptosystems

Cryptosystems. Implementational Aspects. Attacks and Security
Estimations.

Digital Signatures and MACs

Principle. RSA, ElGamal, DSA Signature Scheme. Message Authentication
Codes (MACs).

Hash Functions

Introduction. Security Considerations. Practical Hash Algorithms.

Protocols

Attacks Against Protocols. Security Services. Privacy,
Authentication, Integrity, Non-Repudiation.

Key Distribution and Agreement

Private-Key Approaches. Public-Key Approaches. Certificates. Perfect
Forward Secrecy. Key Derivation.

Introduction to Identification Schemes.

Secret Key Approaches. Challenge-Response Protocols.

                  WHO SHOULD ATTEND

Engineers and other technical professionals who design, assess, or
implement information security applications in software or hardware;
system administrators who need to address security issues in computer
networks; software engineers involved in E-commerce projects;
technical managers who need a solid understanding of data security.

                 ABOUT THE INSTRUCTOR

Dr. Christof Paar leads the Cryptography and Information Security
Group at WPI's ECE Department. Christof's research interests include
efficient implementation of public-key and symmetric-key algorithms,
wireless and ATM security, and cryptographic algorithm agility. He is
the co-organizer of the Workshop on Cryptographic Hardware and
Embedded Systems (CHES), to be held at WPI in August 1999. For more
information on his research, visit http://ece.wpi.edu/Research/crypt

                 DATES AND LOCATIONS

May 6-7 & 13-14, '99 WPI Waltham Campus, Waltham, MA, USA
(10 miles from Boston)

                  FEE

$1795 for first registration

$1625 for subsequent registrations

--------------------- print and cut here -----------------------------

           WPI CONTINUING EDUCATION REGISTRATION FORM

Please print out, complete, and return this form to

  Office of Continuing Education, WPI, Worcester, MA 01609-2280,
  call (508) 831-5517 or FAX this form to (508) 831-5694.
  For further information, send email: continuinged@wpi.edu

Make copies of this form for multiple registrations.

Title of Seminar: APPLIED CRYPTOGRAPHY AND DATA SECURITY

Date of Seminar: May 6-7 & 13-14, '99, WPI Waltham Campus, Waltham, MA

Name (Mr.)(Ms.) ___________________________________________________

Title _____________________________________________________________

Organization ______________________________________________________

Business Address __________________________________________________

City _______________________________________

State ________ Zip _________________________

Business Phone ____________________________

FAX _____________________

Home Phone ______________

Fee Enclosed (Make checks payable to WPI) ______

Bill my Company, P.O.# __________

Please charge my: VISA Mastercard Discover

  Name on card ________________________________________________

  Exp. date _____________________

  Card # ______________________________________________________

  Signature ___________________________________________________

For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text

-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Thu May 27 1999 - 23:44:20