CS294-3: Algorithms in the Real World (Guy Blelloch, Fall 97)

next up previous
Topic 2: Cryptography

[ Topics | Scribe Notes | Readings | Text Books | Links ]


Topic Outline

  • Protocols
  • One-way hash functins
  • Digital signatures
  • Public key protocols
  • Authentication
  • Block and stream algorithms (symmetric)
  • DES (government standard)
  • Blowfish (used in Nautilus and PGPfone)
  • IDEA (used in PGP)
  • RC4 (used in Netscape)
  • Public-key algorithms (asymmetric)
  • Knapsack algorithms
  • RSA
  • Rabin and ElGamal
  • Elliptic curve cryptosystems
  • Applications
  • PGP (pretty good privacy)
  • Kerberos
  • Digital Cash
  • (*) topics will only be covered briefly

    Scribe Notes

  • Cryptography 1 (draft) (Tzu-Yi Chen)
  • Cryptography 2 (draft) (David Oppenheimer)
  • Cryptography 3 (draft) (Marat Boshernitsan)
  • Readings

  • Introduction to Cryptography. A good online intro with several useful links.
  • Bruce Schneier, Applied Cryptography , Wiley, 1996.
  • Chapter 19 (Public Key Algorithms)
  • Chapter 24 (Example Implementations)
  • Recommended Text Books

    Primary
  • Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.
    Several of the chapters are available for free off of the web page.
  • Bruce Schneier, Applied Cryptography , Wiley, 1996.
  • Jennifer Seberry and Josed Pieprzyk. Cryptography: An Introduction to Computer Security Prentice-Hall, 1989.
  • Douglas R. Stinson. Cryptography: Theory and Practice. CRC Press, 1995.
  • William Stallings Cryptography and Network Security : Principles and Practice Prentice-Hall, 1998.
  • Other
  • G. Brassard, Modern Cryptology: a tutorial. Spinger-Verlag, 1988.
  • N. Koblitz, A course in number theory and cryptography. Springer-Verlag, 1987.
  • C. Pfleeger, Security in Computing. Prentice-Hall, 1989.
  • A. Saloma, Public-key cryptography. Springer-Verlag, 1990.
  • D. Welsh, Codes and Cryptography. Claredon Press, 1988.
  • Further Readings and Links

  • General links
  • Ron Rivest's Cryptography and Security Page. Great list of commercial enterprises.
  • Bruce Schneier's Crypto Links
  • The International Cryptography page.
  • Quadralay's Cryptography Archive
  • Cryptography: The Study of Encryption (another archive).
  • Cryptography FAQ (from sci.crypt)
  • Cryptography FAQ (from RSA Data Security, Inc. ).
  • Another list ofCompanies.
  • Survery articles
  • T. Beth. Algorithm engineering for public key algorithms. IEEE Selected Areas of Communication, 1(4), 458--466, 1990.
  • E. F. Brickell and A. M. Odlyzko. Cryptanalysis: A survey of Recent Results. Proceedings of the IEEE, 76(5), 578--593, 1988.
  • W. Diffie. The first ten years of public key cryptography. IEEE proceedings, 76(5), 560--577, 1988.
  • J. Massey. An introduction to contemporary cryptology. IEEE proceedings, 76(5), 533--549, 1988.
  • Simmons (ed.). Contemporary Cryptology: the Science of Information Integrity. IEEE press, 1991.
  • R. L. Rivest. "Cryptology" in Handbook of Theoretical Computer Science, vol. A: Algorithms and Complexity, Elsevier and MIT Press (1990), 717-756.
  • Digital cash.
  • Millicent page.
  • List of propose protocols.
  • DES and other Block Ciphers.
  • Bruce Schneier, Applied Cryptography, Wiley, 1995. Chapter 12, 13 and 14.
  • The Block Cipher Lounge lists the performance and weaknesses of various block ciphers.
  • KERBEROS.
  • J. T. Kohl. The evolution of the KERBEROS authentication service. (abstract).
  • Key Escrow Systems
  • A taxonomy and list of key escrow encryption systems.
  • The Politics of Encryption
  • What's HOT in Encryption

  • Back to the Algorithms in the Real World home page.
    Guy Blelloch, guyb@cs.berkeley.edu.