Information information
Note the essentials- Duration : 22 May to 18 July 2014
- Venue : NAB-I, Kolmogorov Building
- Address : ISI Kolkata, 203 B T Road, Kolkata 700 108
If you are attending the program, your name should be on the list of selected candidates.
Lectures lectures
Special Lectures
Duration : 9 June to 13 June 2014Venue : NAB-I, Kolmogorov Building, ISI Kolkata
| Date | Time | Special Lecture |
|---|---|---|
| 9 June | 10:00 - 11:00 | Secret Sharing using Visual Cryptography [slides]
Bimal Roy (bimal@isical.ac.in) |
| 9 June | 14:00 - 16:00 | How did the assignment go? ;-)
Sourav Sen Gupta (sg.sourav@gmail.com) |
| 10 June | 11:00 - 13:00 | Key Management in Cryptology [slides1, slides2]
Sushmita Ruj (sush@isical.ac.in) |
| 10 June | 15:00 - 17:00 | Code-based Cryptography [paper]
Sumanta Sarkar (sumanta.sarkar@gmail.com) |
| 12 June | 11:00 - 12:00 | Formal Verification of security protocols [slides, book]
Ansuman Banerjee (ansumanb@gmail.com) |
| 12 June | 14:00 - 16:00 | Practical Security : Do you think it is for you?
Vijay Kumar (vk12122.2012@my.bristol.ac.uk) |
| 13 June | 11:00 - 13:00 | Elliptic Curves in Cryptography
Sourav Sen Gupta (sg.sourav@gmail.com) |
| 13 June | 14:00 - 16:00 | Lattices in Cryptography [resources]
Rishiraj Bhattacharyya (rishiraj.bhattacharyya@gmail.com) |
Introductory Lectures
Duration : 22 May to 29 May 2014Venue : NAB-I, Kolmogorov Building, ISI Kolkata
| Date | First Half | Second Half |
|---|---|---|
| 22 May | Orientation Session | Introduction to Cryptology |
| 23 May | Algebra and Number Theory | Symmetric Key Cryptography |
| 26 May | Block Ciphers | Stream Ciphers |
| 27 May | Intractable Problems | Stream Ciphers |
| 28 May | Intractable Problems | Block Ciphers |
| 29 May | Public Key Encryption | Public Key Authentication |
Resources resources
The following pointers may help you understand the contents of the introductory lectures better.| Topic | Pointers |
|---|---|
| Intro and Basic Math | Chapter(s) 1, 2, 3, 4 of Shoup
Chapter(s) 1, 2, 3 of Menezes et al Chapter(s) I, II of Koblitz Chapter(s) 7 of Katz-Lindell |
| Block Ciphers | Chapter(s) 2, 5 of Katz-Lindell
Chapter(s) 7 of Menezes et al Chapter(s) 2, 3 of Stinson |
| Stream Ciphers | Chapter(s) 5, 6 of Menezes et al
Chapter(s) 3 of Katz-Lindell Chapter(s) 2 of Stinson |
| Intractable Problems | Chapter(s) 3 of Menezes et al
Chapter(s) IV, V of Koblitz Chapter(s) 7, 8 of Katz-Lindell |
| Public Key Cryptography | Chapter(s) 1, 10, 12 of Katz-Lindell |
Assignments assignments
The assignment is posted here: Assignment ProblemsProjects projects
Introduction to Practical Crypto and Security Tools
Mentor: Vijay Kumar (vk12122.2012@my.bristol.ac.uk)World of Cryptography and Information Security is huge. In a short association of you all with us, we would try to explore hands-on aspects of secret key encryption, one-way hash function, public-key cryptography, digital signature, certificate, and PKI, using the OpenSSL framework.
We would also try to cover a general introduction to Linux know-how, wireless security, cracking WEP, WPA, Metasploit Framework, Nessus Vulnerability engine, Browser Exploitation Framework (BEEF), sample penetration report, and some capture the flag exercises, depending on the time.
Elliptic Curves in Cryptography
Mentor: Sourav Sen Gupta (sg.sourav@gmail.com)This project will be conducted in the form of a reading course. We will meet twice a week, for a duration of two hours each. Each participant will be responsible for studying and presenting individual topics, and everyone will be responsible for solving the related problems.
We will try to cover as much material as we can, closely following the plan of this course. At the end of the session, you will learn the basic mathematics of elliptic curves, algebraic and number theoretic computations involving the curves, and some applications of these in cryptology.
Lecture Series
The initial Lecture Series is conducted by Sourav Sen Gupta. You may reach him at
sg.[firstname]@gmail.com
3rd Floor, R A Fisher Building
What's new
- 15 June -- Projects started
- 12 June -- Special Lectures -- Slides
- 4 June -- Lectures -- Special Lectures
- 4 June -- Projects -- Elliptic Curves
- 30 May -- Assignments -- Problems
- 30 May -- Assignments -- Groups
- 30 May -- Resources -- Lecture pointers
- 30 May -- References -- Victor Shoup
- 27 May -- Projects -- Practical Crypto
- 26 May -- Logistics -- Library/Internet
References
- Douglas Stinson
Cryptography : Theory and Practice
CRC Press (Third Edition), 2005 - J Katz and Y Lindell
Introduction to Modern Cryptography
Chapman and Hall / CRC, 2007 - Neal Koblitz
Number Theory and Cryptography
Springer (Second Edition), 1994 - A Menezes, P Oorschot, S Vanstone
Handbook of Applied Cryptography
CRC Press (Fifth Printing), 2001
http://cacr.uwaterloo.ca/hac/ - William Stallings
Cryptography and Network Security
Prentice Hall (Fifth Edition), 2010 - Victor Shoup
Computational Num Th and Algebra
Cambridge University Press, 2008
http://shoup.net/ntb/