密码学 入门(一)

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1
Explain and apply the principles of modern cryptology in the context of secure communication. Explain and demonstrate the functionality and desired security of standard cryptographic schemes used for confidentiality and authenticity. Link the design and operation of standard, state-of-the-art symmetric and asymmetric cryptographic schemes to their mathematical underpinnings. Use basic cryptanalytic techniques to evaluate the security level of simple cryptographic schemes.
Bob Bye Anna
Hi Hello Bye
Anna Bye Bob
Introduction
Paradigms of Cryptology
12 / 27
Βιβλιοθήκη Baidu
Secure Communication
Confidentiality, integrity, authenticity
Bob Bye Anna
Please do the diagnostic prior to Friday’s problem class.
Introduction
Paradigms of Cryptology
11 / 27
Two-party communication
Unintended Learning Outcomes
2
3
4
Consider the functionality and desired security of two-party communication
Introduction
Paradigms of Cryptology
12 / 27
Secure Communication
Confidentiality, integrity, authenticity
Introduction
Practicalities of Cryptography A
8 / 27
Course Overview
Feedback
Please do not wait until the exam/end-of-term questionnaire with your questions and comments...
Hi Hello Bye
Anna Bye Bob
Introduction
Paradigms of Cryptology
12 / 27
Secure Communication
Confidentiality, integrity, authenticity
Bob Bye Anna
Hi Hello Bye
Introduction
Paradigms of Cryptology
12 / 27
Secure Communication
Confidentiality, integrity, authenticity
Hello Bye
Bob
Anna
Hello Bye
Anna
Bob
Confidentiality
An adversary cannot see which messages are transmitted No information about the message is being leaked,
Paradigms of Cryptology
12 / 27
Secure Communication
Confidentiality, integrity, authenticity
Bob Bye Anna
Anna Bye Bob
Confidentiality
An adversary cannot see which messages are transmitted
Summative Assessment
One two-hour final exam in January, resit in August/September
Introduction
Practicalities of Cryptography A
7 / 27
Course Overview
Workload
2
Classical Cryptography One Time Pad
Introduction
Practicalities of Cryptography A
4 / 27
Introduction
This course will be about the science of cryptology. We focus on the basics for simplicity and to display the way modern cryptology works. Definitions Reductions (aka security proofs) Constructions We will concentrate on cryptology relevant to secure communication between two parties.
October 8, 2014
2 / 27
Week 1 Monday
Introduction
3 / 27
Outline
1
Introduction Practicalities of Cryptography A Pillars of Cryptology Paradigms of Cryptology Principles of Cryptology Perspective of Cryptography A
Introduction
Paradigms of Cryptology
12 / 27
Secure Communication
Introduction
Pillars of Cryptology
9 / 27
Cryptology is Interdisciplinary
Computer Science
M
at he er ing
m
at ine
ics
ec El tr( on a )ic ng lE
Introduction
Pillars of Cryptology
1 / 27
COMS30002 : Cryptology A
Bristol Crypto Group
Department of Computer Science, University Of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB United Kingdom.
Introduction
Practicalities of Cryptography A
8 / 27
Course Overview
Feedback
Opportunities for you
During the lectures During office hours (Tuesday afternoon) By handing in various small assignments Activities are designed so you can also help each other!
Anna Bye Bob
Introduction
Paradigms of Cryptology
12 / 27
Secure Communication
Confidentiality, integrity, authenticity
Bob Bye Anna
Anna Bye Bob
Introduction
Introduction
Practicalities of Cryptography A
8 / 27
Course Overview
Feedback
What I would like feedback on from you: Jargon and Clarity of Lecture (is it still English?) Timing of Lecture (can you stay awake?) Workload getting out of hand (can you go to bed?)
Introduction
Practicalities of Cryptography A
5 / 27
Unintended Learning Outcomes
1
Explain and apply the principles of modern cryptology in the context of secure communication. Explain and demonstrate the functionality and desired security of standard cryptographic schemes used for confidentiality and authenticity. Link the design and operation of standard, state-of-the-art symmetric and asymmetric cryptographic schemes to their mathematical underpinnings. Use basic cryptanalytic techniques to evaluate the security level of simple cryptographic schemes.
Introduction
Paradigms of Cryptology
12 / 27
Secure Communication
Confidentiality, integrity, authenticity
Hi Bye
Bob
Anna
Hi Bye
Anna
Bob
Confidentiality
An adversary cannot see which messages are transmitted No information about the message is being leaked,
2
3
4
Introduction
Practicalities of Cryptography A
6 / 27
Course Overview
Structure
Teaching and Learning Activities
Twelve weeks of 3 contact hours a week, all preXmas. Monday: 2 hour lecture Friday: 1 hour problem class
10 / 27
Diagnostic Assessment
Maths/CS Background Test
Seven Pillars of Cryptology
1 2 3 4 5 6 7
Computer Science Basics Algorithms Complexity Theory Algebra/Group Theory Linear Algebra Number Theory (esp. Modular Arithmetic) (Discrete) Probability Theory
This is a 10 credit course, corresponding to ≈ 100 hours of work. 30 Lectures and Problem Classes 20 Preparation for Problem Classes 20 Reviewing Lectures after they are given 15 Formative Assessments 15 January Revision and Exam
相关文档
最新文档