Week  Topics  Study Materials  Materials 
1 
General overview of cryptology: symmetric encryption, public key encryption, hash functions and message authentication codes.


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

2 
Introduction to block ciphers: round function; key schedule algorithm; confusion and diffusion; substitution permutation networks; Feistel networks; modes of operations


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

3 
Introduction to stream ciphers: keystream generators; period; security of keystream sequences


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

4 
Introduction to Message Authentication Codes and hash functions; security criteria; applications


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

5 
Design and analysis of block ciphers; DES and AES; their security and design criteria


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

6 
Linear cryptanalysis; nonlinearity; linear cryptanalysis of DES


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

7 
Differential cryptanalysis, difference distribution tables, differential characteristics; attacks on DES


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

8 
security criteria of AES; differential and linear cryptanalysis of AES; branch number and MDS matrices, boomerang and impossible differential attacks


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

9 
Integral attack and square attack; applications on AES


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

10 
LSFR based stream ciphers; periods of LFSR; statistical properties of LFSR; linear complexity and Berlekamp Massey algorithm


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

11 
Cryptanalysis of keystream generators; resynchronization attacks; tradeoff attacks; correlation attacks


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

12 
Construction of compression functions; security analysis of hash functions; Merkle Damgard construction, collision resistance


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

13 
Multicollision attacks and second preimage attacks on Merkle Damgard constructions; herding attacks


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson

14 
Security analysis of SHA family and MD family; SHA3 algorithm


Cryptography: Theory and Practice, 3rd edition, CRC press, Douglas R. Stinson
