Dr. Arathi Arakala, RMIT
Cryptography, the science and art of confidential communication between two parties has been in existence for 1000s of years. From protecting handwritten secrets to military radio communication during the World Wars, many ciphers (algorithms to protect data) have played pivotal roles in history. With the advent of the internet and e-commerce, the number of applications like emails, credit card information and digital media, that need secure data transmission has skyrocketed. In fact every person today needs cryptography to not only keep information secure, but to check its integrity and validate its source.
This course will provide look at the mathematical structures that underpin classical and modern cryptosystems. Topics covered include the concept of perfect secrecy and one-time pads; symmetric ciphers; shift registers and stream ciphers; block ciphers like DES and AES; asymmetric ciphers like the RSA and ElGamal cryptosystems; digital signatures; hash functions and their applications.
Topics covered in this course include:
- Introduction to Private-Key Cryptosystems, Security Objectives and Cryptographic Primitives.
- Background Mathematics – Finite Fields and Primitive Polynomials, Number Theory
- Linear Recurrence Sequences (LRS), Linear Feedback Shift Registers (LFSR), Stream Ciphers.
- Levels of security, Perfect Secrecy, Introduction to Complexity Theory, Computational Security
- Block Ciphers and Modes of Operation, DES, AES
- Introduction to Public-Key Cryptosystems, Knapsack (Merkle Hellman) cryptosystem, RSA cryptosystem, El Gamal cryptosystem.
- Hash Functions, Message Authentication and Digital Signatures.
- Introduction to the technology of Bitcoin and Blockchain. Introduction to post-quantum cryptography.
- The students taking this course should have an understanding of Discrete Mathematics. This includes modular arithmetic with an understanding of Groups and Fields.
- 4 quizzes due at the end of each week 5% each (20% total)
- 2 R-based assignments due at the end of week 2 and week 4 15% each (30% total)
- Final exam 50%
- For those completing the subject for their own knowledge/interest, quizzes must be completed as an attendance requirement
Resources/pre-reading (if available)
There is no set text book for this course, and full lecture notes will be provided. However similar material to that covered can be found in:
- Handbook of Applied Cryptography, Menezes et al., CRC Press, 2018.
- Cryptography : Theory and Practice, Stinson, D. R., Paterson, M. B., 4th ed., Chapman Hall, CRC, 2018.
- R (programming software package) will be required for this course. Details on how to download this will be provided to students on the Canvas LMS after subject enrollments are confirmed.
Not sure if you should sign up for this course?
Take this quiz and look at some of the expected foundational skills in this topic