Previous Up Next

Teóricas

O material pedagógico apresentado nas aulas é entregue nas mesmas.

IMC = Introduction to Modern Cryptography (J. Katz and Y. Lindell)

CTP = Cryptography: Theory and Practice, Third Edition (D. R. Stinson)

HAC = Handbook of Applied Cryptography (A. J. Menezes, P. C. van Oorschot and S. A. Vanstone)

No geral, existe um paralelo forte com o excelente curso de Dan Boneh disponível no youtube e no coursera (vídeos, slides exercícios etc.).

9.1  Aula 1

Programa coberto: Capítulo 1 do IMC e Capítulo 1 do CTP.

Material alternativo:

Um artigo curto e simples sobre técnicas de leitura de material técnico ou científico (pdf).

Why Cryptosystems Fail , Ross Anderson

Criptografia Clássica:

Aulas de Dan Boneh que cobram a matéria dada.

Introduction to Cryptography

What is Cryptography

History of Cryptography

9.2  Aula 2

Programa coberto: Capítulo 2 de IMC e capítulo 2 de CTP, Anexo A de IMC, capítulo 2 de HAC (2.1 e 2.2).

Material alternativo:

Discrete Probability for Cryptography - 1

Discrete Probability for Cryptography - 2

Information Theoretic security and the one time pad

Stream ciphers and pseudo random generators

Attacks on stream ciphers and the one time pad

9.3  Aula 3 e Aula 4

Programa coberto: MIC capítulo 3 , CTP capítulo 8, HAC capítulo 2 (2.3), capítulos 5 e 6.

Material alternativo:

Analise de algoritmos, complexidade de algoritmos, classes de complexidade - Por Jorge Sousa Pinto (DIUM)

A Gentle Introduction to Algorithm Complexity Analysis

Real World Stream Ciphers

PRG Security Definition

Semantic Security

Stream Ciphers are semantically secure

What are block ciphers?

The Data Encryption Standard

Exhaustive search attacks

More attacks on block ciphers

The AES block cipher

Block ciphers from PRGs

Review: PRPs and PRFs

Mode of operation: one time key

Security for mani-time key

Modes of operation: many time key (CBC)

Modes of operation: many time key (CTR)

9.4  Aula 5

Programa coberto: MIC capítulo 4 , CTP capítulo 4 , HAC capítulo 9.

Material alternativo:

Message Authentication Codes

MACs Based On PRFs

CBC-MAC and NMAC

MAC padding

PMAC and the Carter-Wegman MAC

Collision Resistance - Introduction

Generic Birthday attack

The Merkle-Damgard Paradigm

Constructing compression functions

HMAC

Timing attacks on MAC verification


Previous Up Next