CS 517 Advanced Cryptography & Data Security
Spring 2018
Computer Science
Sabanci University
Textbook
 N. P. Smart,
Cryptogrphy Made Simple. First Edition, Springer, 2016, ISBN 9783319219363.
Recommended
resources
 W.
Trappe and Lawrence C. Washington, Introduction to Cryptography with
Coding Theory. Second Edition, Prentice Hall, 2005, ISBN 13
9780131862395

D. R. Stinson, Cryptography, Theory and
Practice, 3^{rd} Edition, Chapman & Hall/CRC, 2006. ISBN:
1584885084.

W. Mao, Modern Cryptography: Theory and Practice. Prentice Hall, 2004.
 A.J.
Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied
Cryptography, CRC Press, 1997. ISBN: 0849385237. Most of the
chapters of this book are available online free of charge.
Time & Place
 Monday 10:4012:30 – FASS G043 (Lecture)
 Tuesday 13:4014:30 – FENS L048 (Lecture)
Motivation
This is a threecredit course
on the advanced methods, algorithms, techniques, and tools of data security
and cryptography.
Topics
 Theoretical
aspects of cryptography :
Probabilistic nature of cryptographic systems, entropy, unconditional security,
computational security, modern cryptography basics.
 Mathematical
foundations: Complexity theory, number theory, finite fields, isomorphism,
cyclotomic polynomials, ring of polynomials, number theoretic transformation
 Elliptic curve
cryptosystems : Elliptic curve group, elliptic curve point operations,
elliptic curve key exchange, elliptic curve digital signature, pairingbased cryptography
 Homomorphic
encrptions scehemes: Homomorphic property, Paillier cryptosystem, DamgardJurick cryptosystem,
latticebased cryptography
 Oblivious
transfer: 1outof2 OT, 1outofN OT, secure product, private information retrieval.
 Cryptographic
protocol theory: Zeroknowledge, sigmaprotocol
 Secure
multiparty computations: secure twoparty computation, Yao’s garbled circuit, secure function evaluation
 Electronic elections:
evoting principles, algorithms and implementation
 SideChannel and fault attacks:
Sidechannel attack principles, cachebased side attacks, fault attacks, countermeasures
Homework
Assignments
Handwritten assignments are not acceptable
Tentative grading
 Midterms: 25 %
 Final: 35 %
 HW Assignments: 15 %
 Project: 25 %
Important Dates
 First midterm:
TBA
 Final: As
scheduled by registrar
Prerequisites
This class is open to graduate students.
Undergraduate students need instructor’s approval.
Dr. Erkay Savas
