``Secrets are made to be found out with time.'' - Charles Sanford

CSE-793A : Course Information

This is an elective course on the Cryptanalysis Techniques for both UG & PG (CSE), and offers total 4 Credits.

Pre-requisites:
Discrete Mathematics, Applied Cryptography

Tentative Course Plan:
  • Differential Cryptanalysis
  • Linear Cryptanalysis
  • Meet in the Middle Attack
  • Rebound Attack 
  • Time-Memory Trade-off Attack
  • Hash function attacks (Damgaard's MD4 attack, Wang's attack on MD4, MD5, SHA-1)
  • Attacks against RSA, Number Field Sieve
  • Side channel attacks (Cache timing, Fault attacks, Memory remanence)
  • Algebraic attacks
  • Quantum Attacks (Shor's algorithm, Grover's algorithm)
  • Biclique Cryptanalysis (may be)
Grading Scheme: 
  • Bonus Marks for good questions asked in the class (up to 10%)
  • Summary of one-topic you learned the class (10%)
  • Homework (20%)
  • Weakly Progress of Project (40 %)
  • Two Project presentations in 1st week of March and last 2 weeks of April (15% + 15%)
  • No Exam



Topic of the Week

  • Happy Ending of the Course !!! Course is completed now by some wonderful presentation that are listed here : Linear Cryptanalysis Meet in the Middle Attack  Rebound Attack Algebraic Attacks using SAT solvers Quantum Computing Side Channel ...
    Posted May 6, 2015, 9:07 PM by Amit Kumar Chauhan
  • Factoring Large Integers The Integer Factorization problem : Given a composite integer N, find a non-tirvial factor p of N, i.e., find p such that p | N. Straightforward method : Trial Division (check ...
    Posted Feb 18, 2015, 10:50 AM by Amit Kumar Chauhan
  • Cryptanalysis of the Hash Function MD4 The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990. The digest length is 128 bits.  It is an earlier version of MD5, an ...
    Posted Feb 16, 2015, 2:37 AM by Amit Kumar Chauhan
Showing posts 1 - 3 of 5. View more »

Homework Assignments

  • HW 2 - On the Design of Hash Functions Submission Deadline : Mar 9, 2015 (submit in the class)Problem 1. What are the essential requirements for secure and fast implementation of NIST standards like SHA-3 ? Problem 2. Malicious ...
    Posted Feb 16, 2015, 5:52 AM by Amit Kumar Chauhan
  • HW 1 : Differential Cryptanalysis of DES Submission Deadline : Jan 29, 2015 (in class). Problem 1. For S-box 1 of DES, what is the probability that the input difference 0x34, produces the output difference 0x4 ? Problem ...
    Posted Jan 26, 2015, 11:16 PM by Amit Kumar Chauhan
Showing posts 1 - 2 of 2. View more »

Subpages (1): Topic of the Week