[crypto] [eidma@TUE.nl: FW: Course announcement: ``Methods of Cryptanalysis'' by Alex Bir
yukov]
R. Hirschfeld
ray@unipay.nl
Thu, 3 Oct 2002 10:43:26 +0200
------- Start of forwarded message -------
From: eidma@TUE.nl
To: eidma@TUE.nl
Subject: FW: Course announcement: ``Methods of Cryptanalysis'' by Alex Bir
yukov
Date: Thu, 3 Oct 2002 10:10:23 +0200
> -----Original Message-----
> From: Danny De Cock [mailto:Danny.DeCock@esat.kuleuven.ac.be]
> Sent: woensdag 2 oktober 2002 0:33
> To: Danny De Cock
> Subject: Course announcement: ``Methods of Cryptanalysis'' by Alex
> Biryukov
>
>
> Dear Madame,
> Dear Sir,
>
> Alex Biryukov, full time postdoc researcher at Cosic, will
> teach a special
> course on ``Methods of Cryptanalysis''. This course is part of the
> Doctoral School program.
>
> These courses are scheduled every Friday starting from
> October 18th, and
> can be followed (free of charge and registration) by
> everybody who shows
> some interest in the topics enumerated below.
>
> The exact location for these courses will be announced on Cosic's home
> page (http://www.esat.kuleuven.ac.be/cosic).
>
> With kind regards, Danny De Cock.
>
>
>
>
> Brief Course description
> ------------------------
>
> "Cryptanalysis is an ancient art of analyzing and breaking
> ciphers. It is
> also a relatively new modern science, which becomes more and
> more popular
> with and advent of cryptography in everyday life due to the
> Internet.
> The aim of this course is to show a broad range of cryptanalytic
> techniques with a focus on symmetric primitives.
>
> Prerequisites: This is a graduate level course, so basic
> "Cryptography"
> course is a requirement.
>
> Grading: Grading will be based on writing scribe notes for some of the
> class lectures; or giving 1 hour presentation of one of the papers,
> assigned by the lecturer; or doing a mini-research project. Those, who
> will come just for fun are also welcome."
>
>
> Tentative list of topics to be covered (subject to change):
> -----------------------------------------------------------
> 1. History of cryptanalysis, simple ciphers, Enigma.
>
> 2. Shannon's theory and Feistel's ideas: Lucifer & DES.
>
> 3. Birthday paradox and its applications.
> Properties of random functions/permutations.
>
> 4. Tradeoffs (Hellman's tradeoff for one-way functions),
> (Biryukov-Shamir's tradeoff for stream ciphers).
>
> 5. Is DES a pure cipher? Coppersmith's estimates for the group
> size of DES.
>
> 6. Differential cryptanalysis and its extensions.
>
> 7. Linear cryptanalysis and its extensions.
>
> 8. Higher order differentials and interpolation attacks.
>
> 9. Attacks using impossible differentials.
>
> 10. Slide attacks on simple iterative and auto-key constructions.
>
> 11. Boomerang attack.
>
> 12. If time permits (attacks on double/triple encryption,
> attacks on hash functions, stream ciphers).
> --------------------------------------------------------------
> ----------
>
------- End of forwarded message -------