CS 517 Advanced Cryptography & Data Security
- N. P. Smart,
Cryptogrphy Made Simple. First Edition, Springer, 2016, ISBN 978-3-319-21936-3.
Trappe and Lawrence C. Washington, Introduction to Cryptography with
Coding Theory. Second Edition, Prentice Hall, 2005, ISBN 13-
D. R. Stinson, Cryptography, Theory and
Practice, 3rd Edition, Chapman & Hall/CRC, 2006. ISBN:
W. Mao, Modern Cryptography: Theory and Practice. Prentice Hall, 2004.
Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied
Cryptography, CRC Press, 1997. ISBN: 0-8493-8523-7. Most of the
chapters of this book are available online free of charge.
Time & Place
- Monday 10:40-12:30 – FASS G043 (Lecture)
- Tuesday 13:40-14:30 – FENS L048 (Lecture)
This is a three-credit course
on the advanced methods, algorithms, techniques, and tools of data security
aspects of cryptography :
Probabilistic nature of cryptographic systems, entropy, unconditional security,
computational security, modern cryptography basics.
foundations: Complexity theory, number theory, finite fields, isomorphism,
cyclotomic polynomials, ring of polynomials, number theoretic transformation
- Elliptic curve
cryptosystems : Elliptic curve group, elliptic curve point operations,
elliptic curve key exchange, elliptic curve digital signature, pairing-based cryptography
encrptions scehemes: Homomorphic property, Paillier cryptosystem, Damgard-Jurick cryptosystem,
transfer: 1-out-of-2 OT, 1-out-of-N OT, secure product, private information retrieval.
protocol theory: Zero-knowledge, sigma-protocol
multiparty computations: secure two-party computation, Yao’s garbled circuit, secure function evaluation
- Electronic elections:
e-voting principles, algorithms and implementation
- Side-Channel and fault attacks:
Side-channel attack principles, cache-based side attacks, fault attacks, countermeasures
Handwritten assignments are not acceptable
- Midterms: 25 %
- Final: 35 %
- HW Assignments: 15 %
- Project: 25 %
- First midterm:
- Final: As
scheduled by registrar
This class is open to graduate students.
Undergraduate students need instructor’s approval.
Dr. Erkay Savas