Info on CA

Conditions

Cryptanalysis

Subject of the group A for: Informatics - Cryptology
Term: summer
Extent: 3-1
Year: 1st graduate study
Lecturers:
prof. RNDr. Otokar Grošek, CSc.
Doc. RNDr. Ladislav Satko, CSc.
RNDr. Karol Nemoga, CSc.

Proportion of final exam in the course completion: 50%.

Keywords: Rotor ciphers, Differential and linear cryptanalysis, discrete logarithm, factorization of modulus, cryptanalysis of stream ciphers.

Annotation: Cryptanalysis of classical ciphers. Statistical methods for cryptanalysis of classical ciphers. Difference of cryptanalysis of block and stream ciphers. Differential and linear cryptanalysis of block ciphers. Cryptanalysis of asymmetric ciphers. Cryptanalysis of selected stream ciphers based on LFSR.

Syllabus - in twelve points:

  1. Cryptanalysis: Notions, mathematical background.
  2. Cryptanalysis of classical rotor ciphers. A practical demonstration.
  3. Design of modern block ciphers. Birthday paradox. Herlestam's attack.
  4. S-box theory. Differential cryptanalysis of DES.
  5. Linear cryptanalysis of DES.
  6. Cryptanalysis of asymmetric ciphers and sensitivity of their parameters.
  7. Discrete logarithm problem. Possible attacks on DSA.
  8. Selected methods for factorization.
  9. Adaptive attack on RSA with PKCS#1 standard.
  10. Description and design of stream ciphers. NESSIE project.
  11. Basic attacks on stream ciphers. Siegenthaler's and Meier's attacks.
  12. Ciphering in mobile communication.

Target: The aim of this course is to present an overview of selected methods of cryptanalysis for block, stream and asymmetric ciphers. An influence to chosen parameters is discussed too.

Recommended prerequisites: Cryptology. Analysis and complexity of algorithms.

Bibliography:

foreign:
A.G.Konheim: Cryptography. A primer. J. Wiley and Sons, New York, 1981.
H.Reisel: Prime numbers and computer methods for factorization. Birkhäuser, Boston, 1994.
R.A.Rueppel: Analysis and Design of Stream Ciphers. Springer-Verlag, Berlin, 1986.