Practical Cryptography HY 590.82
Spring 2008
Instructor: Debbie Cook
dcook AT cs.columbia.edu
Agenda
Course outline with mapping to references.
Homework
Homework
Code samples for students that have taken HY457
- AES code Includes key schedule, encryption
and decryption functions. This will need to be modified for each problem
using AES.
- AES key schedule Example code that can be
modified to time AES's key schedule.
- Camellia code Includes key schedule,
encryption and decryption functions. This will need to be modified for each
problem using Camellia. You will need to use the key schedule from this
when timing Camellia's key schedule.
- Header file for Camellia code
References
Books
[GB99] Lecture Notes in Cryptography, Shafi Goldwasser and Mihir Bellare, 1999.
[KPS02] Network Security Private Communication in a Public World, Kaufman, Perlman and Speciner, 2nd edition, Prentice Hall, 2002.
[S96] Applied Cryptography, 2nd edition, Bruce Schneier, John Wiley & Sons, 1996.
Standards and Competitions
[ES] estream competition, http://www.ecrypt.eu.org/stream/
[NES] NESSIE Security Report, version 1.0, October 21, 2002
[NIST800-22] A STAISTIICAL TEST SUITE FOR RANDOM AND PSEUDORANDOM NUMBER GENERATORS FOR CRYPTOGRAPHIIC APPLIICATIIONS, NIST Special Publication 800-22 (revised May 15, 2001)
[NIST-MODES] NIST Block Cipher Modes http://csrc.nist.gov/groups/ST/toolkit/BCM/index.html
[NIST-46-3] NIST FIPS 46-3 (DES) http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
[NIST-197] NIST FIPS 197 (AES) http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Papers
[B-crypt] Probable Plaintext Cryptanalysis of the IP Security Protocols, Steven M. Bellovin, manuscript.
[B94] On Matsui.s Linear Cryptanalysis, Eli Biham, Technical Report CS0813, Technion, 1994.
[BBS08] Divertible Protocols and Atomic Proxy Cryptography, Matt Blaze, Gerrit Bleumer and Martin Strauss, Eurocrypt, LNCS 1403, 2008.
[BS92] Differential Cryptanalysis of the Full 16-Round DES, Eli Biham, Adi Shamir, CRYPTO '92.
[C99] Security and Composition of Multi-party Cryptographic Protocols, Ran Canetti, manuscript, 1999.
[CGKO06] Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions, Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky, ACM CCS 2006.
[DA01] Secure MultiParty Computation Problems and Their Applications: A Review and Open Problems, Wenliang Du and Mikhail J. Atallah, New Security Paradigms Workshop, 2001.
[HR03] A Tweakable Enciphering Mode, Shai Halevi and Phillip Rogaway, Crypto 2003.
[YL03] General Composition and UNiversal Composability in Secure Multi-Party Computation, Y. Lindell, manuscript 2007 (updated FOCS, 2003 paper).
[M93] Linear Cryptanalysis Method for DES Cipher, Matsui, EUROCRYPT 1993.
Cache Attacks and Countermeasures: the Case of AES (Extended Version), Dag Arne Osvik1, Adi Shamir2 and Eran Tromer2, revised 2005.
[R-MODES] Efficient Instantiations of Tweakable Blockciphers andRefinements to Modes OCB and PMAC, Phillip Rogaway, manuscript.
[SWP00] Practical Techniques for Searches on Encrypted Data, Dawn Xiaodong Song, David Wagner, Adrian Perrig, IEEE Symposium on Security and Privacy, 2000.