CS 579 Foundations of Cryptography
Crypto and Security
Discuss how cryptography helps to achieve common
security goals (data secrecy, message integrity,
non-repudiation) and tasks (authentication).
MS
CyS
A
security threats
MS
CyS
C
crypto
BS
CyS
B
analyze
Symmetric Crypto
Explain the notions of symmetric encryption, hash
functions, and message authentication, and sketch their formal
security definitions.
MS
CyS
A
security threats
MS
CyS
C
crypto
BS
CyS
B
analyze
Symmetric Crypto Practice
Describe and implement the specifics of some of the
prominent techniques for encryption, hashing, and message
authentication (e.g, DES, AES, SHA-1, HMAC).
MS
CyS
B
security practice
BS
CyS
C
design
Public Key Encryption
Explain the notions of public-key encryption and
digital signatures, and sketch their formal security
definitions.
MS
CyS
C
crypto
BS
CyS
B
analyze
Public Key Crypto Practice
Describe and implement the specifics of some of the
prominent techniques for public-key cryptosystems and digital
signature schemes (e.g., Rabin, RSA, ElGamal, DSA, Schnorr,
OAEP, PSS/PSS-R).
MS
CyS
B
security practice
BS
CyS
C
design
Symmetric vs. Public Key Crypto
Illustrate the difference between symmetric and
public-key cryptography.
MS
CyS
C
crypto
BS
CyS
J
tradeoffs
Cryptanalysis
Evaluate cryptographic primitives and their
implementations for correctness, efficiency, and security.
MS
CyS
A
security threats
MS
CyS
B
security practice
BS
CyS
C
design