CS 411/507 Cryptography
Fall Term 2017
Computer Science
Sabanci University
Textbook
W. Trappe & L. C. Washington. Introduction to Cryptography
with Coding Theory, 2^{nd} Edition, PrenticeHall, 2006. ISBN:
0131981994.
Recommended
resources
 Nigel P. Smart. Cryptography Made Simple.
Springer, 2016. ISBN 9783319219363
 C. Paar and J. Pelzl. Understanding Cryptography: A Textbook for
Students and Practitioners. Springer, 2010. ISBN 9783642041006
 J. Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied
Cryptography, CRC Press, 1997. ISBN: 0849385237.Most of the
chapters of this book is available online free of charge. Please click
on the name of the book to access to the chapters in pdf
format. And please read the copyright notice.
 D. R. Stinson, Cryptography, Theory and Practice,
3^{rd} Edition, Chapman & Hall/CRC, 2006. ISBN:
1584885084.
Time & Place
 Monday 08:40  10:30
FENS G035
 Wednesday 14:40 
15:30 FENS G035
Instructor’s
Office Hours: Wednesday 15:4016:30 or by appointment
Teaching Assistant: Atıl Utku Ay
Office
Hours of TA: TBA
Motivation
This is an introductory course
on the methods, algorithms, techniques, and tools of data security and
cryptography. After studying the theoretical aspects of cryptographic
algorithms and protocols, we show how these techniques can be integrated to
solve particular data and communication security problems. This course
material is of use to computer and communication engineers who are interested
in embedding security into an information system, and thus, providing
integrity, confidentiality, and authenticity of the documents and the
communicating parties.
Topics
 Introduction and
Classical Cryptosystems: Secure communication. Attacks to
cryptosystems. Classical cryptographic techniques and algorithms. One
time pad, randomness and pseudorandomness
 Mathematical
Foundations: Number theory. Finite fields. Primitive roots. Square roots.
Exponentiation and discrete logarithm.
 SecretKey
Cryptography: Block ciphers and stream ciphers. DES, AES (Rijndael). Modes of operation.
 PublicKey
Cryptography: Oneway functions. Trapdoor oneway functions.
Publickey cryptosystems. RSA, DiffieHellman,
ElGamal, and elliptic curve cryptosystems.
 Authentication
and Digital Signatures: Cryptographic checksums. Hash functions and
messagedigest functions. Digital signatures. Authentication protocols.
 Protocols: Zeroknowledge
proof systems. Identification protocols. Key management architectures.
Homework
Assignments
Handwritten assignments are not acceptable
Examinations
Course Materials
 Introduction,
 classic
ciphers,
 number theory,
 stream ciphers
 block ciphers &
DES,
 Advanced Encryption
Standard(AES)
 Public Key
Cryptography and RSA
 Discrete Logarithm
 Elliptic Curve
Cryptography
 Digital Signatures
 Secret Sharing
 Games
 Zero Knowledge
Protocols
 Key Establishment
Protocols
Tentative grading
 Midterm: 30 %
 Final: 35 %
 HW Assignments: 20 %
 Project: 15 %
Important Dates
 First midterm:
TBA
 Final: As
scheduled by registrar
Class Projects
for Fall 2015
 Project Requirements
 Proposal Due
Date: TBA.
 Electronic Copy
Due Date: TBA
Links for
Cryptographic Information
Prerequisites
This class is open to graduate and graduate students.
Experience in a programming language is required.
Dr. Erkay Savas
