____________________________________________________________________
Before a larger group can see the virtue of an idea, a
smaller group must first understand it.
"Stranger Suns"
George Zebrowski
The Armadillo Group ,::////;::-. James Choate
Austin, Tx /:'///// ``::>/|/ [EMAIL PROTECTED]
www.ssz.com .', |||| `/( e\ 512-451-7087
-====~~mm-'`-```-mm --'-
--------------------------------------------------------------------
---------- Forwarded message ----------
Date: Wed, 7 Mar 2001 13:32:58 -0500
From: "R. A. Hettinga" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED], [EMAIL PROTECTED],
Digital Bearer Settlement List <[EMAIL PROTECTED]>
Subject: Crypto Short Course
--- begin forwarded text
Date: Wed, 7 Mar 2001 13:10:03 -0500 (EST)
From: Christof Paar <[EMAIL PROTECTED]>
To: WPI Crypto Seminar -- Fall 2000 EE 578/CS 578: ;
Subject: Crypto Short Course
Sender: [EMAIL PROTECTED]
Reply-To: Christof Paar <[EMAIL PROTECTED]>
I am offering again a 4 day short course in applied crypto. A brief
outline is below. For more info about the course contents and
registration, please see our web site at
http://www.ece.wpi.edu/Research/crypt/courses/short_course.html
Regards,
Christof
! WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES 2001) !
! Paris, France, May 13-16, 2001 !
! www.chesworkshop.org !
***********************************************************************
Christof Paar, Assistant Professor
Cryptography and Information Security (CRIS) Group
ECE Dept., WPI, 100 Institute Rd., Worcester, MA 01609, USA
fon:(508) 831 5061 email: [EMAIL PROTECTED]
fax:(508) 831 5491 www: http://www.ece.wpi.edu/People/faculty/cxp.html
***********************************************************************
Worcester Polytechnic Institute
4-Day Short Course
April 16,17 & 26,27
WPI Southborough Campus
APPLIED CRYPTOGRAPHY AND DATA SECURITY
Seminar Leader: Dr. Christof Paar
COMPLETE COURSE INFORMATION AND REGISTRATION:
www.ece.wpi.edu/Research/crypt/courses/short_course.html
COURSE OUTLINE
Day 1, AM - Introduction to Cryptography and Data Security
Overview. Private-Key Cryptosystems. Cryptanalysis.
Day 1, PM - Stream Ciphers
Random Number Generators. Synchronous Stream Ciphers and LFSRs. Attacks.
One Time Pad. Unconditional and Computational Security.
Day 2, AM - Block Ciphers: DES and AES
DES Functionality and History; Implementation: Hardware and Software;
Attacks and Security Estimations. AES: Functionality and History; Hardware
and Software Implementations. Other block ciphers. Key length and security.
Day 2, PM - Modes and Variants of Block Ciphers
Operation modes of block ciphers. Multiple encryption. Key whitening.
Day 3, AM - Public-key Cryptography
Principle. Some Number Theory. Overview of Practical
Schemes. Public-Key standards (ANSI, IEEE).
Day 3, PM - Public-key Algorithms
RSA Cryptosystem: Functionality, implementational aspects, recent attacks
and security estimations. Diffie-Hellman key exchange. Elliptic curve
cryptosystems: principle, practical and security aspects.
Day 4, AM - Digital Signatures and Protocols
Digital Signatures. Authentication Codes (MACs). Hash Functions. Protocols
for Privacy, Authentication, Integrity, Non-Repudiation.
Challenge-and-response protocols.
Day 4, PM - Key Distribution and Case Study
Key Distribution: Private-key approaches, public-Key approaches.
Certificates. Key Derivation. Case Study: Secure Socket Layer Protocol.
For help on using this list (especially unsubscribing), send a message to
"[EMAIL PROTECTED]" with one line of text: "help".
--- end forwarded text
--
-----------------
R. A. Hettinga <mailto: [EMAIL PROTECTED]>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'