2. Stream ciphers |
Pseudorandom generators. Composition of PRGs. Security. Attacks. Case studies |
4. Message integrity |
Authentication codes. Message integrity. Definition of security. Keyed MACs. PRFs and MAC. Hashing, hash functions. Universal hashing. Collision resistant hashing. Case studies |
6. Public key cryptography |
Definition. Semantic security. One-way trapdoor functions. RSA, ElGamal, McEliece crypto systems. Diffie-Hellman key agreement. Digital signatures. Case studies |
8. Identification protocols |
Definitions. Passwords. Challenge-response. sigma-protocols. Okamoto and Schnorr protocols |
10. Data hiding and steganography |
Definitions. Spread-spectrum watermarking. Dirty paper coding. Digital forensics. |