课程目录: 密码学与信息论培训

4401 人关注
(78637/99817)
课程大纲:

密码学与信息论培训

 

 

Cryptography Overview

This module defines the technical terms in cryptography and introduce Alice,

Bob, and Eve. To study the attacker Eve's perspective,

we will describe Kerckhoff's Principle ("the attacker knows the system"), which defines

the scope of the attacker knowledge (what is secret vs. what the attacker can know).

We will also describe Security by Obscurity, which contrasts Kerckhoff's Principle.

Information Entropy

This module studies information entropy to quantify randomness.

Information entropy can be used to measure the strength of the key or the secret

information that determines the security of a cryptosystem against an attacker who does not know the random key.

Brute-Force Attack and Cryptanalysis

This module studies the attacker view whose objective

is to learn the key and break the cryptographic protection using the key.

First, we will define brute force attack and describe how to quantify the attacker effort

for brute force attack. Next, we will contrast cryptanalysis and brute force attack. Lastly,

we will discuss about perfect secrecy, which is immune to cryptanalysis and is a strong notion of security derived from information theory.

 

Computational Security and Side-Channel Attack

This module studies cryptography from the practical point of view.

We will first define computational security, which relies on the fact that real world attackers

are computationally limited unlike information theoretic security, e.g., one-time pad. We will then survey

side channel attacks and unintentional information leakage from the physical implementations of cryptosystems.