Robert Hettinga (rah@shipwright.com)
Fri, 2 Apr 1999 06:56:39 -0500
--- begin forwarded text
Date: Thu, 1 Apr 1999 23:09:43 -0500 (EST)
From: Christof Paar <christof@ece.WPI.EDU>
To: "WPI.Crypto.Seminar":;
cc: DCSB <dcsb@ai.mit.edu>
Subject: Cryptography Short Course
Sender: bounce-dcsb@ai.mit.edu
Reply-To: Christof Paar <christof@ece.WPI.EDU>
Worcester Polytechnic Institute
4-Day Short Course
Waltham Campus
APPLIED CRYPTOGRAPHY AND DATA SECURITY
Seminar Leader: Dr. Christof Paar
This course will provide you with an in-depth understanding of
applied cryptography and information security. Most of today's
information technology applications require security as a central
system feature. Applications such as LAN computer networks,
intranets, E-commerce, database systems, and many www applications
rely heavily on a high degree of system security. This four-day
course will provide you with a solid foundation in state-of-the-art
cryptography and data security.
The course provides you with a balance of cryptographic algorithms,
protocols, standards, and many real-world examples. All cryptography
schemes will be introduced together with up-to-date security
assessments, information on their software and hardware performance,
and remarks on their implementation. At the end of the course you
will have the skills to design, assess, and implement data security
schemes for given applications.
Note: The Applied Cryptography course has been taught to more than
250 technical professionals and graduate students. On-site programs
were delivered at the NASA Lewis Research Center, OH, GTE Government
Systems, MA, and at Philips Research, NY.
COURSE OUTLINE
Introduction to Cryptography and Data Security
Overview. Private-Key Cryptosystems. Cryptanalysis.
Private-key Algorithms: Stream Ciphers
Random Number Generators. Synchronous Stream Ciphers and LFSRs.
Attacks. One Time Pad. Unconditional and Computational Security.
Private-key Algorithms: Block Ciphers
DES Functionality and History. DES Implementation: Hardware
and Software. Attacks and Security Estimations. AES and other block
ciphers.
Modes and Variants of Block Ciphers
Operation modes of block ciphers. Multiple encryption. Key whitening.
Introduction to Public-Key Cryptography
Principle. Some Number Theory. Overview of Practical Schemes: RSA,
Diffie-Hellman-type, Elliptic Curves. Public-Key standards (ANSI,
IEEE)
RSA
Cryptosystem. Implementational Aspects. Recent Attacks and Security
Estimations.
Diffie-Hellman-Type Cryptosystems
The generalized discrete logarithm problem. Diffie-Hellman key
exchange. ElGamal encryption. Elliptic curve cryptosystems.
Elliptic Curve Cryptosystems
Cryptosystems. Implementational Aspects. Attacks and Security
Estimations.
Digital Signatures and MACs
Principle. RSA, ElGamal, DSA Signature Scheme. Message Authentication
Codes (MACs).
Hash Functions
Introduction. Security Considerations. Practical Hash Algorithms.
Protocols
Attacks Against Protocols. Security Services. Privacy,
Authentication, Integrity, Non-Repudiation.
Key Distribution and Agreement
Private-Key Approaches. Public-Key Approaches. Certificates. Perfect
Forward Secrecy. Key Derivation.
Introduction to Identification Schemes.
Secret Key Approaches. Challenge-Response Protocols.
WHO SHOULD ATTEND
Engineers and other technical professionals who design, assess, or
implement information security applications in software or hardware;
system administrators who need to address security issues in computer
networks; software engineers involved in E-commerce projects;
technical managers who need a solid understanding of data security.
ABOUT THE INSTRUCTOR
Dr. Christof Paar leads the Cryptography and Information Security
Group at WPI's ECE Department. Christof's research interests include
efficient implementation of public-key and symmetric-key algorithms,
wireless and ATM security, and cryptographic algorithm agility. He is
the co-organizer of the Workshop on Cryptographic Hardware and
Embedded Systems (CHES), to be held at WPI in August 1999. For more
information on his research, visit http://ece.wpi.edu/Research/crypt
DATES AND LOCATIONS
May 6-7 & 13-14, '99 WPI Waltham Campus, Waltham, MA, USA
(10 miles from Boston)
FEE
$1795 for first registration
$1625 for subsequent registrations
--------------------- print and cut here -----------------------------
WPI CONTINUING EDUCATION REGISTRATION FORM
Please print out, complete, and return this form to
Office of Continuing Education, WPI, Worcester, MA 01609-2280,
call (508) 831-5517 or FAX this form to (508) 831-5694.
For further information, send email: continuinged@wpi.edu
Make copies of this form for multiple registrations.
Title of Seminar: APPLIED CRYPTOGRAPHY AND DATA SECURITY
Date of Seminar: May 6-7 & 13-14, '99, WPI Waltham Campus, Waltham, MA
Name (Mr.)(Ms.) ___________________________________________________
Title _____________________________________________________________
Organization ______________________________________________________
Business Address __________________________________________________
City _______________________________________
State ________ Zip _________________________
Business Phone ____________________________
FAX _____________________
Home Phone ______________
Fee Enclosed (Make checks payable to WPI) ______
Bill my Company, P.O.# __________
Please charge my: VISA Mastercard Discover
Name on card ________________________________________________
Exp. date _____________________
Card # ______________________________________________________
Signature ___________________________________________________
For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".
--- end forwarded text
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The following archive was created by hippie-mail 7.98617-22 on Thu May 27 1999 - 23:44:20