2. Stream ciphers |
Pseudorandom generators. Composition of PRGs. Security. Attacks. Case
studies |
4. Message integrity |
Authentication codes. Message integrity. Definition of security. Keyed
MACs. PRFs and MAC. Hashing, hash functions. Universal hashing. Collision
resistant hashing. Case studies |
6. Public key cryptography |
Definition. Semantic security. One-way trapdoor functions. RSA, ElGamal,
McEliece crypto systems. Diffie-Hellman key agreement. Digital
signatures. Case studies |
8. Identification protocols |
Definitions. Passwords. Challenge-response. sigma-protocols. Okamoto
and Schnorr protocols |
10. Data hiding and steganography |
Definitions. Spread-spectrum watermarking. Dirty paper coding. Digital
forensics. |