Practical Cryptography HY 590.82

Spring 2008

Instructor: Debbie Cook
dcook AT cs.columbia.edu

Agenda

Course outline with mapping to references.

Homework

Homework

Code samples for students that have taken HY457

References

Books

  • [GB99] Lecture Notes in Cryptography, Shafi Goldwasser and Mihir Bellare, 1999.
  • [KPS02] Network Security Private Communication in a Public World, Kaufman, Perlman and Speciner, 2nd edition, Prentice Hall, 2002.
  • [S96] Applied Cryptography, 2nd edition, Bruce Schneier, John Wiley & Sons, 1996.
  • Standards and Competitions

  • [ES] estream competition, http://www.ecrypt.eu.org/stream/
  • [NES] NESSIE Security Report, version 1.0, October 21, 2002
  • [NIST800-22] A STAISTIICAL TEST SUITE FOR RANDOM AND PSEUDORANDOM NUMBER GENERATORS FOR CRYPTOGRAPHIIC APPLIICATIIONS, NIST Special Publication 800-22 (revised May 15, 2001)
  • [NIST-MODES] NIST Block Cipher Modes http://csrc.nist.gov/groups/ST/toolkit/BCM/index.html
  • [NIST-46-3] NIST FIPS 46-3 (DES) http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
  • [NIST-197] NIST FIPS 197 (AES) http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  • Papers

  • [B-crypt] Probable Plaintext Cryptanalysis of the IP Security Protocols, Steven M. Bellovin, manuscript.
  • [B94] On Matsui.s Linear Cryptanalysis, Eli Biham, Technical Report CS0813, Technion, 1994.
  • [BBS08] Divertible Protocols and Atomic Proxy Cryptography, Matt Blaze, Gerrit Bleumer and Martin Strauss, Eurocrypt, LNCS 1403, 2008.
  • [BS92] Differential Cryptanalysis of the Full 16-Round DES, Eli Biham, Adi Shamir, CRYPTO '92.
  • [C99] Security and Composition of Multi-party Cryptographic Protocols, Ran Canetti, manuscript, 1999.
  • [CGKO06] Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions, Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky, ACM CCS 2006.
  • [DA01] Secure MultiParty Computation Problems and Their Applications: A Review and Open Problems, Wenliang Du and Mikhail J. Atallah, New Security Paradigms Workshop, 2001.
  • [HR03] A Tweakable Enciphering Mode, Shai Halevi and Phillip Rogaway, Crypto 2003.
  • [YL03] General Composition and UNiversal Composability in Secure Multi-Party Computation, Y. Lindell, manuscript 2007 (updated FOCS, 2003 paper).
  • [M93] Linear Cryptanalysis Method for DES Cipher, Matsui, EUROCRYPT 1993.
  • Cache Attacks and Countermeasures: the Case of AES (Extended Version), Dag Arne Osvik1, Adi Shamir2 and Eran Tromer2, revised 2005.
  • [R-MODES] Efficient Instantiations of Tweakable Blockciphers andRefinements to Modes OCB and PMAC, Phillip Rogaway, manuscript.
  • [SWP00] Practical Techniques for Searches on Encrypted Data, Dawn Xiaodong Song, David Wagner, Adrian Perrig, IEEE Symposium on Security and Privacy, 2000.