The course aims
Introduce the problem of cryptography and its use in building security systems on computer networks. The course wants to give insight into the cryptography methods and techniques. The aim of the course is to familiarize students with cryptoanalysis, and in particular the object-oriented approach to cryptoanalysis, to fully understand the encryption problems and their significance from the point of view of information security.
Introduction to cryptography with definitional settings of the cryptography basis. Protection of data resources and information channels. Information theory, with the definition of entropy, and by defining the problem of perfect security. Key length problem (Shannon's approach). Theory of complexity and cryptoanalysis, and relation to NP-completeness. Codes based on harder computing issues. Theory of numbers from the standpoint of conformity and modular arithmetic, and inversion calculation. Encryption algorithms - transpositional codes, substitution codes (monophabetic, homophonic, polyphabetic, polygrams), multilevel substitution codes, productive codes, exponential encryption, cipher code. Formal definition of cryptographic system and associated metrics. The problem of data secrecy, authenticity and transformation. Cryptographic systems with symmetric and asymmetric keys, and study the principles of the associated algorithms (DES, RSA ...).
1. Bruce Schneier, Applied Cryptography: Protoc ols, Algorithms and Source Code in C, Second edition, John Wiley and Sons, October 18, 1995.
2. Niels Ferguson, Bruce Schneier, Practical Cryptography, John Wiley and Sons, 2003
1. Eric Rescorla, SSL and TLS : Designing and Building Secure Svstems, Addison Wesley Professioal, 1st edition October 13, 2000.
2. D. R. Stinson, Cryptography. Theory and Practice, CRC Press, 2002.