v Subject matter
Ø Introduction and Conventional Encryption
§ Types of attacks
§ Old-time ciphers
§ Modern block ciphers
· DES
· Other algorithms – Blowfish, Idea, etc.
· Reversibility – Feistel structure or reversible primitives
· Performance and strength comparisons
§ Confidentiality
· Random number generation
· Key distribution
Ø Public Key Cryptography
§ The RSA algorithm
§ Diffie-Hellman key exchange
Ø Number Theory
§ Modulo arithmetic
§ Fermat’s and Euler’s theorems
§ Euclid’s algorithm and its extension
§ Exponentiation and Chinese remainder
§ Primality and primality testing
Ø Message Authentication
§ Authentication requirements
§ Hash functions without keys
§ MAC functions with secret keys
§ Embedded algorithms (those with pre- and post encryption
§ The signature problem – what is guaranteed by a signature
v Coverage
Ø See exam policies
Ø Through Tuesday, February 12
Ø Through chapter 9 – not including appendices 3A and 6A
Ø No Bent functions, elliptic curves, or Chinese remainder calculations
v Exam methodology
Ø Open book and notes (avoids memorization)
Ø Mostly short-answer
§ What if
§ Why
§ Invent a way to do---
Ø Learn capabilities, not forgettable details
Ø Emphasis is more on protocols and algorithm consequences than on ciphers themselves