FACOLTA' DI INGEGNERIAUniversita' di Pavia
Home
  Teaching > Insegnamenti > Crittografia e protezione dell'informazione Translate this page in English
About the Faculty
Orientation
Teaching
Research
Services
Industry partnerships
Mobility Erasmus
Shortcuts
Search in this site
Crittografia e protezione dell'informazione

2009-10 Academic year

Lecturer: Carlo Bertoluzza  

Course name: Crittografia e protezione dell'informazione
Course code: 064028
Degree course: Ingegneria Informatica
Disciplinary field of science: ING-INF/05
L'insegnamento è caratterizzante per: Ingegneria Informatica
University credits: CFU 5
Course website: n.d.

Specific course objectives

Aim of the course: give a sufficiently in-depht knowledge of the most used private and public key cipher sistems.

Course programme

After a short exposition of the history of the cryptography, the two principal classes of the cipher sistems (public and private keys) are presented. Moreover some applications are described which are used against the active cryptanalisis. In paricular data integrity, key management and digital signature.

Classical cryptosistems

  • 1. A brief history of cryptography.
  • 2. Monoalphabetic and polialphabetic substitutions.
  • 3. Classical and column tranposition, Hill cipher.
  • 4. Mechanical Cryptographic Devices (ENIGMA and M-209)
  • 5. General definition of Cipher Sistems, closed and pure ciphers.
  • 6. Cryptogram and message residue classes.
  • 7. Shannon theory and perfect secrecy.
  • 8. A perfect system: the One Time Pad

Private Key Cryptosistems

  • 1. Flow Chiphers.
  • - Shift register as key generators.
  • - Characteristic polinomials and periodicity.
  • - Golomb criteria and randomness.
  • - Non-linear and composed shift registers, Multip;exars.
  • 2. Block ciphers: gneral structure.
  • - Data Encryption Standard.
  • - Finite fields and AES cipher.
  • - Modular arithmetic and IDEA cipher.

Public Key Cryptosystems

  • 1. A survey on complexity and modular arithmetic.
  • 2. Public key ciphers.
  • - Subset sum problem and Merkle-Hellmann cipher.
  • - Integer facoring and RSA.
  • - Discrete square root and Rabin cipher.
  • - Discrete logarithm and ElGamal cipher.
  • 3. The Omura-Massey "without key" cipher.

Applications against active cryptanalisis

  • 1. Hash function and data integrity.
  • 2. Key generation, Key distribution and Key management.
  • 3. Digital signature with appendix.
  • - General structure and compression funtion.
  • - Logarithm based ElGamal and DSA signature.
  • - Square rooth based Fiat-Shamir signature
  • 4. Digital signature with recovery.
  • - General structure and redundancy funtion.
  • - RSA based protocol
  • - Square root based Rabin protocol
  • 5. Arbitrated signature: the one-time Rabin scheme.
  • 6. Blind signature: the Caum protocol.

Course entry requirements

Elementary notions of probability theory in finite spaces. In particular Bayes theorem, random variables and laws of large nombers.

Course structure and teaching

Lectures (hours/year in lecture theatre): 40
Practical class (hours/year in lecture theatre): 0
Practicals / Workshops (hours/year in lecture theatre): 0
Project work (hours/year in lecture theatre): 0

Suggested reading materials

Becker & Piper. Cypher Syatems. Northwood Books, 1982.

D.R. Stinson. Cryptography. Chapman & Hall 2002.

Menezes, van Oorshot, Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.

Testing and exams

Copyright © Facoltà di Ingegneria - Università di Pavia