1 / 21

Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU

Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU. Announcement 1. CSE department is launching MS program in Cyber-Security Beginning Fall 2009 Details coming up shortly!!. Announcement 2.

arty
Download Presentation

Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lecture 1: IntroductionCS 6903: Modern CryptographySpring 2009Nitesh SaxenaPolytechnic Institute of NYU

  2. Announcement 1 • CSE department is launching MS program in Cyber-Security • Beginning Fall 2009 • Details coming up shortly!!

  3. Announcement 2 • Seeking participants for a usability study of an authentication mechanism • Shoulder-surfing resistant PIN entry • Online study • Little effort • Please talk to me if you are interested; your participation will be appreciated • It will be good fun!

  4. Outline • Administrative Stuff • Introductory Technical Stuff

  5. Some Pointers • Course Web Page http://isis.poly.edu/courses/cs6903-s2009 • Instructor: Nitesh Saxena • http://cis.poly.edu/~nsaxena • Office: LC228 • Email: nsaxena@poly.edu • Phone No: 718-260-3116 • Office Hours: Wednesdays 3-5pm (or by appointment) • MyPoly Web Page: http://my.poly.edu/

  6. About the Instructor • PhD from UC Irvine • Research in computer and network security, and applied cryptography

  7. Prerequisites • Discrete Mathematics (MA 2312/2322) • Design and Analysis of Algorithms (CS603 or CS3414) • Data Analysis (MA2212) or equivalent Basically, what you need is: • Good mathematical background • Knowledge of basic probability theory • Knowledge of basic algorithms • If you don’t satisfy the prerequisites as such, but are interested, I encourage you to take the course. But, do talk to me.

  8. Why Take this Course • Cryptography is HOT • If you are “theory-inclined”, it’s an interesting course to take • If you work in the general area of security, it’s an important course to take • According to the MS/PhD course curriculum, you are required to take at least 2 courses from the THEORY area, of which this this course is one. • Theory Core Area for MS • CS 6003 Foundations of Computer Science • CS 6033 Design and Analysis of Algorithms I • CS 6043 Design and Analysis of Algorithms II • CS 6753 Theory of Computation • CS 6903 Modern Cryptography • CS 9173 Computational Geometry

  9. What to Expect • The course would be theoretical • With theorems and proofs • No programming whatsoever • We will have few homeworks • We will have a project based on a relevant topic in cryptography • I can suggest some projects • You are also free to choose your own project, after discussion with me • There will be no exam; no programming Grading • 60% homeworks • 30% project (plus a class presentation of the project) • 10% notes scribing (in latex) • I might/will make mistakes • Please point them out • Talk to me if you have any issues (or send me an anonymous email ☺) • I guarantee that • you’ll have fun and you’ll learn • you won’t become experts, but you will learn enough to move on! • you’ll hopefully get motivated to pursue research in this area, ultimately

  10. What are my expectations of you • Attend lectures • Take notes; ask questions • Review your notes and the scribe right after the lecture; refer to relevant references • Use my office hrs to clear your doubts and for any help • I’ll try to review last lecture at the beginning of every lecture • Ask questions then • Turn your homeworks on time; no collaboration • Be prompt in choosing your project topic • You must work in teams of two each

  11. Lecture Scribing • Teams of two each • Latex • I’ll give you last time’s lecture scribes • Update it in your own words based on current lectures • Volunteer for today?

  12. Other Security Courses at Poly • Computer Security CS 392/6813 • Network Security CS 6823 • Other specialized courses

  13. Course References • Free online lecture material developed by well-known cryptographers: - http://www.cse.ucsd.edu/users/mihir/papers/gb.html - http://www.cse.ucsd.edu/~mihir/cse207/index.html • Book: Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/Crc Cryptography and Network Security Series) - http://www.amazon.com/Introduction-Cryptography-Chapman-Network-Security/dp/1584885513/ • The online book on applied cryptography might be useful: http://www.cacr.math.uwaterloo.ca/hac/ • Other links to be provided as we proceed • Bookmark these links today!

  14. Grading • 60% - Homeworks (probably 4-6 in #) • 30% - Project (and a presentation) • 10% - Notes scribing (in latex)

  15. What is Cryptography • Etymologically: secret (crypt) writing (graphy) • Study of mathematical techniques to achieve various goals in information security, such as confidentiality, integrity, availability, non-repudiation, etc (we cover these today!) • Not the only (and not a sufficient) means of providing information security, rather a subset of techniques • Quite an old field! • A cryptographer designs the code, a cryptanalyst tries to break it • Philosophically, cryptography is a contest between the cryptographer and the cryptanalyst!

  16. What is the course about • Study of modern cryptography from a theoretical perspective • Study of cryptographic primitives that are the building-blocks of various cryptographic applications • “provable security” concept; formal analysis

  17. How we would proceed in the course • Study a cryptographic primitive (such as encryption) • Study its security notions • What it means for a cryptographic primitive to be secure (for example, what it means for an encryption scheme to be secure) • What is the adversarial model • Study its various constructions (such as symmetric key encryption DES, public key encryption RSA) • Formally anlayze the security of a particular construction based on a particular security notion • Theorem-Proofs (provable security) • [Time permitting] Study how to combine various crypto primitives for a cryptographic application/protocol

  18. CS 6903 vs. CS 392/6813 • Study a cryptographic primitive (such as encryption) • Study its security notions • What it means for a cryptographic primitive to be secure (for example, what it means for an encryption scheme to be secure) • What is the adversarial model • Study its various constructions (such as symmetric key encryption DES, public key encryption RSA) • Formally anlayze the security of a particular construction based on a particular security notion • Theorem-Proofs (provable security)

  19. Tentative Course Schedule • Symmetric encryption (block ciphers) • Pseudo-random functions • Hash functions and random oracles • Message authentication code • Number Theory • Asymmetric encryption • Digital signatures • [Protocols for authenticated key exchange]

  20. Some Basic Goals in Information Security • Confidentiality • Authentication • Integrity • Non-repudiation • Cryptography can be used to achieve these goals • Let’s see how and warm up a little bit!! • Please take notes

  21. Today’s Reading • http://www-cse.ucsd.edu/users/mihir/cse207/w-intro.pdf • Section 3.1.3 of the textbook for the logic of provable security and reduction

More Related