Cryptography
Mort YaoTextbook:
- Jonathan Katz and Yehuda Lindell. Introduction to Modern Cryptography, 2nd edition.
Supplementary reading:
- John Talbot and Dominic Welsh. Complexity and Cryptography: An Introduction.
- Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Handbook of Applied Cryptography.
- Darrel Hankerson, Alfred Menezes and Scott Vanstone. Guide to Elliptic Curve Cryptography.
1 Introduction
Preliminaries: Basic statistics, theory of computation (Computability: Turing machines and algorithms).
1.1 Principles of Modern Cryptography
1.2 Classical Ciphers
1.2.1 Shift Cipher
1.2.2 Substitution Cipher
1.2.3 Vigenère Cipher
2 Information-Theoretic Security
Preliminaries: Information theory.
2.1 Perfect Secrecy
2.2 One-Time Pad (OTP)
3 Private-Key Cryptography
Preliminaries: Basic probability theory, theory of computation (Complexity: efficient algorithms and negligible functions).
3.1 One-Way Functions and Pseudorandomness
3.2 Private-Key Encryption and Computational Security
3.3 Message Authentication Codes (MAC)
3.4 Stream Ciphers
3.5 Block Ciphers
3.6 Hash Functions
4 Public-Key Cryptography
Preliminaries: Basic abstract algebra, algebraic and computational number theory.