|  |  | Classical Cryptosystems
        Basics of modulo arithmeticShift cipher, Substitution cipher, Affine cipherVigenere 
        cipherThe Enigma machine Basic Secret Key Encryption
        One-time Pad, Stream Ciphers, RC4 and LFSR'sFeistel networks. DES. Strengthening DES: DESX and 3DES.
		Modes of using block ciphers.
        Attacks on block ciphers: Time-space tradeoffs, Differential & 
		Linear cryptanalysisThe AES cipher.  
         Public Key Encryption
        Basic Number TheoryRSA: The algorithm, primality testing, and attacksRabin encryption  
        Cryptography using arithmetic modulo primes:  Discrete log. 
        Diffie-Hellman Key Exchange.ElGamal encryption. 
         Message Integrity
        Non keyed hash functions.  Motivation and 
        applications. 
        Message Authentication Codes (MAC).   
        Applications.  
        Constructions: CBC-MAC, HMAC. Digital Signatures
        Definition of secure signature schemes. One-time signature.How to sign using RSA. Brief overview of the Digital Signature 
        Standard (DSS) and ElGamal.      Identification Protocols
        Challenege-ResponseZero-knowledge proofs: Fiat-Shamir, Schnorr Key Establishment
        Key agreement protocolsNeedham-SchroederPublic key 
		certificates, PKI Protocols
        Blind signaturesCommitment schemes 
        Oblivious transferElectronic cash Notions of Security
			Information theoretic securitySemantic securitySecure Pseudorandom Sequence Generation Other Topics
        Secret sharingGeneral Secure Multi-party Computation protocols
			Quantum cryptography |