Course “Cryptographic Algorithms”
Ruslan Ospanov
This course discusses guidelines based on current research aimed at building new systems with a long life cycle. The course aims to provide guidance in the field of cryptography and is addressed to professionals who develop and implement cryptographic solutions within organizations. In this course, we will focus on only two decisions that are important to users of cryptography.
First, is it possible to consider a cryptographic algorithm suitable for further use today, if it is already in use. The first principle is that if an algorithm is not considered suitable for modern use, or is considered for such use with only some caution, then this should be taken as an indication that the algorithm should be replaced as a matter of urgency.
Second, we consider whether the cryptographic algorithm is suitable for use in new or future systems. The second principle is that specialists are now planning and preparing to phase out the use of existing algorithms over 5-10 years, and replace them with algorithms that they consider safe for future use.
This course examines algorithms that have been standardized to a certain extent and have been deployed or planned to be deployed in real systems, and therefore will be of interest to decision makers in manufacturing and government.
Course program
(each topic is designed for a minimum of 1 hour,
so the minimum course duration is 20 hours)
Module |
Theme |
1.General issues. |
1.1. Introduction. Definitions. |
1.2. Cryptograpic security. |
|
1.3. Side channel attacks. |
|
1.4. Random number generation. |
|
1.5. Key management system. |
|
2. Cryptographic primitives. |
2.1. Symmetric block ciphers. |
2.2. Hash functions. |
|
2.3. Symmetric stream ciphers. |
|
2.4. Asymmetric cryptographic primitives. |
|
2.5. Key sizes. |
|
3. Cryptographic schemes. |
3.1. Encryption modes of symmetric block encryption algorithms. |
3.2. Message Authentication Codes (MACs). |
|
3.3. Authenticated encryption (with attached data). |
|
3.4. Key derivation functions. |
|
3.5. Asymmetric cryptographic schemes. |
|
4. Cryptographic protocols. |
4.1. Key installation protocols. |
4.2. Identification and authentication protocols. |
|
4.3. Key exchange protocols with password authentication. |
|
4.4. Some specific cryptographic protocols. |
|
4.5. Some application specific protocols. |