CRYPTOSYSTEMS and CRYPTOGRAPHIC PROTOCOLS
Instructor: Prof.Dr. Mehmet E.
Teaching Assistant: Dr.Gül BOZTOK firstname.lastname@example.org
Paar and Pelzl, Understanding Cryptography, Springer, 2010
1. Trappe, Cryptography and Coding, 2/e, 2010
2. Stinson, Douglas R., Cryptography: Theory and Practice, CRC
3. Schneier, B., Applied Cryptography, 2/e, Wiley, 1996
Goals: To introduce theory behind shared-key and public-key cryptography,
and to introduce some cryptographic protocols/applications.
mathematical skills, graduate standing (and the perceptive ability implied
Simple ciphers including
substitution, permutation and Vigenere
Perfect secrecy and one-time
The Data Encryption Standard
Encryption Standard (AES)
RSA and El-Gamal public-key
Diffie-Hellman Key Exchange
A variety of protocols
including Authentication and Digital Signatures,
Bit Commitment and Fair Coin Flips, Zero-knowledge Proofs, etc.
Protocol Failures in
Quantum Cryptography (if
· Homeworks ( %20),
· Project (%20),
Mihir Bellare Modern Cryptography Lecture Notes
* A. Menezes, P.
van Oorschot and s. Vanstone, Handbook of Applied Cryptography, CRC Press,
* R. Spillman,
Classical and Contemporary Cryptology, Pren-Hall, 2004
can discuss homework with other people (especiall with your classmates).
However, you must write the answers to the homework questions alone, using
your OWN WORDS. Copying and sharing homeworks will be penalized severly.
you submit your homework on time* you get 20% bonus, if you submit late*
you receive 20% penalty, otherwise you get 0 points for that homework.
On time* means you hand in the homework on the due
date (or early) to the Professor (thats me) at the start of the class.
Late* : Late homeworks can be submitted only to
the TA (thats Gül) at most within a week after the due date. After a week
no late homeworks will be accepted.