Czym jest kryptografia.
Enigma. Tajność doskonała (Shannon'a). Perfect secrecy, perfect indistinguishability. Vernam cipher (OTP).
Lektura: rozdziały 1-7 Introduction to Modern Cryptography
Ciphertext-only attack, security for multiple encryptions, chosen ciphertext attack. (non-)Malleability. Perfect indistinguishability. Semantic security.
Stream ciphers. Pseudo random bit generators. Predictability. Statistical tests. Examples: LFSRs, shrinking generators. WEP 802.11b, RC4, GSM (A5/1), DVD (CSS). Modern stream ciphers:
eStream.
Feistel network. Substitution-permutation network. Pseudo-random function. Pseudo-random permutation. DES, AES.
Hash functions. Random oracles. Cryptographic sponge functions (
sponge) (Keccak/
SHA-3).
CCA security. Authenticated encryption. Message authentication codes.
Factoring algorithms: Dixon's random squares, Quadratic Sieve, Number Field Sieve. Discrete log: Baby-step giant-step, Rho-Pollard, NFS