Introduction to Modern Cryptography

Introduction to Modern Cryptography

Author(s) : Mihir Bellare and Phillip Rogaway, Department of Computer Science and Engineering, University of California
Publication Date : September 2005

This document functions as notes for course CSE 207: Modern Cryptography at Computer Science and Engineering, University of California.

This course is an introduction to modern cryptography as a science. The viewpoint in this course is “theory brought to practice”, specifically the application of the theory of “provable-security” to the design and analysis of real world cryptographic schemes. This course considers tasks like encryption, signatures, authentication, and key distribution. The goal is to instill understanding of fundamentals of cryptographic protocol design.

Although the aim is to end up with practical solutions, the work involved is largely theoretical. This document will spend much of its time understanding how to formally define and model various goals, and prove correct protocols for these goals. This document is not about computer security. It will not be covering topics like operating systems security, viruses, and worms.

Functions as course notes for UCSD course CSE207. Feedback, corrections and comments welcome.

Preface: postscript ; pdf

Chapter Notes Slides
Introduction postscript ; pdf pdf
Block ciphers postscript ; pdf pdf
Pseudorandom functions postscript ; pdf pdf
Symmetric encryption postscript ; pdf pdf
Hash functions postscript ; pdf pdf
Message authentication postscript ; pdf pdf
Computational number theory postscript ; pdf pdf
Number-theoretic primitives postscript ; pdf pdf
Asymmetric encryption postscript ; pdf pdf
Digital signatures postscript ; pdf pdf
Key distribution pdf
Appendix Notes
The birthday problem postscript ; pdf

Related posts: