0% found this document useful (0 votes)
134 views

IT663 Mathematical Foundations of Cryptography

This document outlines the course objectives and units of study for IT663 Mathematical Foundations of Cryptography. The course aims to provide detailed knowledge of the mathematical models and theorems underlying cryptography. It covers topics such as symmetric and asymmetric key cryptography, one-way functions, pseudo-random generators and permutations, message authentication codes, digital signatures, and zero-knowledge proofs. Upon completing the course, students should understand the mathematical foundations behind cryptographic techniques and be able to analyze cryptographic protocols formally.

Uploaded by

dharani v
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views

IT663 Mathematical Foundations of Cryptography

This document outlines the course objectives and units of study for IT663 Mathematical Foundations of Cryptography. The course aims to provide detailed knowledge of the mathematical models and theorems underlying cryptography. It covers topics such as symmetric and asymmetric key cryptography, one-way functions, pseudo-random generators and permutations, message authentication codes, digital signatures, and zero-knowledge proofs. Upon completing the course, students should understand the mathematical foundations behind cryptographic techniques and be able to analyze cryptographic protocols formally.

Uploaded by

dharani v
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

IT663 Mathematical Foundations of Cryptography

L – T – P: 3 – 0 – 0 Credit: 3
Objectives: The objective of the course is to provide detail knowledge of math behind
cryptography.
Pre-requisite: Cryptography knowledge of B.Tech level.
Outcome: Student should be able to know the Mathematical models / Theorems behing
cryptography.
UNIT I Lectures: 8
Introduction to Cryptography: Basics of Symmetric Key Cryptography, Basics of
Asymmetric Key Cryptography, Hardness of Functions
Notions of Semantic Security (SS) and Message Indistinguishability (MI): Proof of Equivalence of SS and
MI, Hard Core Predicate, Trap-door permutation, Goldwasser-Micali Encryption
Goldreich-Levin Theorem: Relation between Hardcore Predicates and Trap-door permutations
UNIT II Lectures: 8
Formal Notions of Attacks: Attacks under Message Indistinguishability: Chosen Plaintext Attack (IND-CPA),
Chosen Cipher text Attacks (IND-CCA1 and INDCCA2), Attacks under Message Non-malleability: NM-CPA
and NM-CCA2, Interrelations among the attack model
Random Oracles: Provable Security and asymmetric cryptography, hash functions
One-way functions: Weak and Strong one way functions
UNIT III Lectures: 10
Pseudo-random Generators (PRG): Blum-Micali-Yao Construction, Construction of more powerful PRG,
Relation between One-way functions and PRG, Pseudorandom Functions (PRF)
Building a Pseudorandom Permutation: The Luby Rackoff Construction: Formal Definition, Application of
the Luby Rackoff Construction to the construction of Block Ciphers, The DES in the light of Luby Rackoff
Construction
UNIT IV Lectures: 8
Left or Right Security (LOR)
Message Authentication Codes (MACs): Formal Definition of Weak and Strong MACs, Using a PRF as a
MAC, Variable length MAC
Public Key Signature Schemes: Formal Definitions, Signing and Verification, Formal Proofs of Security of
Full Domain Hashing
UNIT V Lectures: 8
Assumptions for Public Key Signature Schemes: One way functions Imply Secure One-time Signatures
Shamir's Secret Sharing Scheme
Formally Analyzing Cryptographic Protocols
Zero Knowledge Proofs and Protocols
Reference Books
1. Hans Delfs and Helmut Knebl, Introduction to Cryptography: Principles and Applications, Springer Verlag.
2. Wenbo Mao, Modern Cryptography, Theory and Practice, Pearson Education (Low Priced Edition)
3. Shaffi Goldwasser and Mihir Bellare, Lecture Notes on Cryptography, Available at
http://citeseerx.ist.psu.edu/.
4. Oded Goldreich, Foundations of Cryptography, CRC Press (Low Price Edition Available), Part 1 and Part 2

You might also like