130 likes | 151 Views
Explore cryptographic concepts and applications, including symmetric ciphers, digital signatures, zero-knowledge proofs, and more in CS538 Cryptography course taught by Gene Itkis. Focus on rigorous formal definitions and proofs.
E N D
CAS CS 538 Cryptography
General info • Instructor: • Gene Itkis (itkis+cs538@cs.bu.edu) • Course page: • www.cs.bu.edu/fac/itkis/538 • Also found from the CS dept. courses page Gene Itkis, CS538 Crypto
General Info • Prerequisite: CS 332 or consent of instructor • Relation to CS458 • Overlap exists, butapproach is different • Here (cs538) much more formal & rigorous • Homeworks • pen & paper • ~weekly Gene Itkis, CS538 Crypto
Info sources • WEB page www.cs.bu.edu/~itkis/538 • Office hours: M 12-1pm, W 2:30-4:30pm • email – mailing list:csmail –a cs538 • For personal mail remember: there are many of you, 1 of me. So please do not take it personally in case of delays. Do not hesitate to call or stop by, esp. in case of delays! Gene Itkis, CS538 Crypto
Collaboration NO!!! • Discussing concepts and ideas, as well as system features is OK (encouraged!!!) • Always give credit when using someone else’s work • See web page for more details Gene Itkis, CS538 Crypto
Grading • Approximately: 70% - homeworks30% - final No midterm! Gene Itkis, CS538 Crypto
Questions? End of Administrativia
Topics • Perfect security: Shannon's lowerbound & the Vernam cipher (one-time pad) • Pseudorandom generators (a.k.a. stream ciphers): definition, discrete log problem, and Blum-Micali construction • Indistinguishability-based definition and composability theorem for pseudorandom generators • Integer factorization, Chinese remainder theorem, and Blum-Blum-Shub pseudorandom generator • Intuition and first examples of public-key encryption: RSA, Rabin. Definition of security. • Encrypting long messages with RSA, Blum-Goldwasser and PKCS #1 • Brief history. Diffie-Hellman key agreement, decisional Diffie-Hellman assumption, and ElGamal encryption • Introduction to one-way and trapdoor functions, hardcore bits, Goldreich-Levin construction.Definition of digital signatures. • Signature schemes and hash functions. Merkle trees. Random oracle model. Full-domain hashRSA and Rabin • Symmetric ciphers and message authentication codes • Zero-Knowledge proofs • Secret sharing • Multiparty computation Gene Itkis, CS538 Crypto
Topics (coarse grain) • Perfect Info-Theoretic Security • Pseudo-Randomness (definitions and constructions) • Generators & Functions • Computational Security – definitions & constructions • Encryption, Signatures • One-Way & Trap-Door functions (integrated above) • Hashing: collision-resistance, random oracle • Extra: ZKP, multi-party computation Gene Itkis, CS538 Crypto
How (and why) • Rigorous: formal definitions and proofs • Often the defined goals will look impossible to achieve, but we’ll prove that our constructions satisfy such strong definitions (under some reasonable assumptions) • Explicit: precise formal assumptions • Unified: theoretical and applied together • Though focus is more on theory, this theory is directly relevant to applications • Background reviewed in the book’s Appendices • Big-O, number-theoretic algorithms, reductions, complexity Gene Itkis, CS538 Crypto
“Generic Template” • Functional definition • “modules” and “interfaces” • Security definition • Possibly many for the functional definition • Construction • Typically many • Security proof • For a <construction – security definition> pair Gene Itkis, CS538 Crypto
Information-Theoretic Security:Perfect secrecy & One-Time Pad Let’s dive in! Gene Itkis, CS538 Crypto