[crypto] [eidma@TUE.nl: FW: Course announcement: ``Methods of Cryptanalysis'' by Alex Bir yukov]

R. Hirschfeld ray@unipay.nl
Thu, 3 Oct 2002 10:43:26 +0200


------- Start of forwarded message -------
From: eidma@TUE.nl
To: eidma@TUE.nl
Subject: FW: Course announcement: ``Methods of Cryptanalysis'' by Alex Bir
	yukov
Date: Thu, 3 Oct 2002 10:10:23 +0200 


> -----Original Message-----
> From: Danny De Cock [mailto:Danny.DeCock@esat.kuleuven.ac.be]
> Sent: woensdag 2 oktober 2002 0:33
> To: Danny De Cock
> Subject: Course announcement: ``Methods of Cryptanalysis'' by Alex
> Biryukov
> 
> 
> Dear Madame,
> Dear Sir,
> 
> Alex Biryukov, full time postdoc researcher at Cosic, will 
> teach a special
> course on ``Methods of Cryptanalysis''.  This course is part of the
> Doctoral School program.
> 
> These courses are scheduled every Friday starting from 
> October 18th, and
> can be followed (free of charge and registration) by 
> everybody who shows
> some interest in the topics enumerated below.
> 
> The exact location for these courses will be announced on Cosic's home
> page (http://www.esat.kuleuven.ac.be/cosic).
> 
> With kind regards, Danny De Cock.
> 
> 
> 
> 
> Brief Course description
> ------------------------
> 
> "Cryptanalysis is an ancient art of analyzing and breaking 
> ciphers. It is
> also a relatively new modern science, which becomes more and 
> more popular
> with and advent of cryptography in everyday life due to the 
> Internet.  
> The aim of this course is to show a broad range of cryptanalytic
> techniques with a focus on symmetric primitives.
> 
> Prerequisites: This is a graduate level course, so basic 
> "Cryptography"
> course is a requirement.
> 
> Grading: Grading will be based on writing scribe notes for some of the
> class lectures; or giving 1 hour presentation of one of the papers,
> assigned by the lecturer; or doing a mini-research project. Those, who
> will come just for fun are also welcome."
> 
> 
> Tentative list of topics to be covered (subject to change):
> -----------------------------------------------------------
> 1. History of cryptanalysis, simple ciphers, Enigma.
> 
> 2. Shannon's theory and Feistel's ideas: Lucifer & DES.
> 
> 3. Birthday paradox and its applications.
> Properties of random functions/permutations.
> 
> 4. Tradeoffs (Hellman's tradeoff for one-way functions),
> (Biryukov-Shamir's tradeoff for stream ciphers).
> 
> 5. Is DES a pure cipher? Coppersmith's estimates for the group
> size of DES.
> 
> 6. Differential cryptanalysis  and its extensions.
> 
> 7. Linear cryptanalysis and its extensions.
> 
> 8. Higher order differentials and interpolation attacks.
> 
> 9. Attacks using impossible differentials.
> 
> 10. Slide attacks on simple iterative and auto-key constructions.
> 
> 11. Boomerang attack.
> 
> 12. If time permits (attacks on double/triple encryption,
> attacks on hash functions, stream ciphers).
> --------------------------------------------------------------
> ----------
> 
------- End of forwarded message -------