Information information

Note the essentials
  • Duration : 22 May to 18 July 2014
  • Venue : NAB-I, Kolmogorov Building
  • Address : ISI Kolkata, 203 B T Road, Kolkata 700 108

If you are attending the program, your name should be on the list of selected candidates.

Lectures lectures

Special Lectures

Duration : 9 June to 13 June 2014
Venue : NAB-I, Kolmogorov Building, ISI Kolkata

Date Time Special Lecture
9 June 10:00 - 11:00 Secret Sharing using Visual Cryptography [slides]
Bimal Roy (bimal@isical.ac.in)
9 June 14:00 - 16:00 How did the assignment go? ;-)
Sourav Sen Gupta (sg.sourav@gmail.com)
10 June 11:00 - 13:00 Key Management in Cryptology [slides1, slides2]
Sushmita Ruj (sush@isical.ac.in)
10 June 15:00 - 17:00 Code-based Cryptography [paper]
Sumanta Sarkar (sumanta.sarkar@gmail.com)
12 June 11:00 - 12:00 Formal Verification of security protocols [slides, book]
Ansuman Banerjee (ansumanb@gmail.com)
12 June 14:00 - 16:00 Practical Security : Do you think it is for you?
Vijay Kumar (vk12122.2012@my.bristol.ac.uk)
13 June 11:00 - 13:00 Elliptic Curves in Cryptography
Sourav Sen Gupta (sg.sourav@gmail.com)
13 June 14:00 - 16:00 Lattices in Cryptography [resources]
Rishiraj Bhattacharyya (rishiraj.bhattacharyya@gmail.com)

Introductory Lectures

Duration : 22 May to 29 May 2014
Venue : NAB-I, Kolmogorov Building, ISI Kolkata

Date First Half Second Half
22 May Orientation Session Introduction to Cryptology
23 May Algebra and Number Theory Symmetric Key Cryptography
26 May Block Ciphers Stream Ciphers
27 May Intractable Problems Stream Ciphers
28 May Intractable Problems Block Ciphers
29 May Public Key Encryption Public Key Authentication

Resources resources

The following pointers may help you understand the contents of the introductory lectures better.

Topic Pointers
Intro and Basic Math Chapter(s) 1, 2, 3, 4 of Shoup
Chapter(s) 1, 2, 3 of Menezes et al
Chapter(s) I, II of Koblitz
Chapter(s) 7 of Katz-Lindell
Block Ciphers Chapter(s) 2, 5 of Katz-Lindell
Chapter(s) 7 of Menezes et al
Chapter(s) 2, 3 of Stinson
Stream Ciphers Chapter(s) 5, 6 of Menezes et al
Chapter(s) 3 of Katz-Lindell
Chapter(s) 2 of Stinson
Intractable Problems Chapter(s) 3 of Menezes et al
Chapter(s) IV, V of Koblitz
Chapter(s) 7, 8 of Katz-Lindell
Public Key Cryptography Chapter(s) 1, 10, 12 of Katz-Lindell

Assignments assignments

The assignment is posted here: Assignment Problems

Projects projects

Introduction to Practical Crypto and Security Tools

Mentor: Vijay Kumar (vk12122.2012@my.bristol.ac.uk)

World of Cryptography and Information Security is huge. In a short association of you all with us, we would try to explore hands-on aspects of secret key encryption, one-way hash function, public-key cryptography, digital signature, certificate, and PKI, using the OpenSSL framework.

We would also try to cover a general introduction to Linux know-how, wireless security, cracking WEP, WPA, Metasploit Framework, Nessus Vulnerability engine, Browser Exploitation Framework (BEEF), sample penetration report, and some capture the flag exercises, depending on the time.

Elliptic Curves in Cryptography

Mentor: Sourav Sen Gupta (sg.sourav@gmail.com)

This project will be conducted in the form of a reading course. We will meet twice a week, for a duration of two hours each. Each participant will be responsible for studying and presenting individual topics, and everyone will be responsible for solving the related problems.

We will try to cover as much material as we can, closely following the plan of this course. At the end of the session, you will learn the basic mathematics of elliptic curves, algebraic and number theoretic computations involving the curves, and some applications of these in cryptology.

 

Lecture Series

The initial Lecture Series is conducted by Sourav Sen Gupta. You may reach him at

EMail   sg.[firstname]@gmail.com
Office   3rd Floor, R A Fisher Building

What's new

  • 15 June -- Projects started
  • 12 June -- Special Lectures -- Slides
  • 4 June -- Lectures -- Special Lectures
  • 4 June -- Projects -- Elliptic Curves
  • 30 May -- Assignments -- Problems
  • 30 May -- Assignments -- Groups
  • 30 May -- Resources -- Lecture pointers
  • 30 May -- References -- Victor Shoup
  • 27 May -- Projects -- Practical Crypto
  • 26 May -- Logistics -- Library/Internet

References

  • Douglas Stinson
    Cryptography : Theory and Practice
    CRC Press (Third Edition), 2005
  • J Katz and Y Lindell
    Introduction to Modern Cryptography
    Chapman and Hall / CRC, 2007
  • Neal Koblitz
    Number Theory and Cryptography
    Springer (Second Edition), 1994
  • A Menezes, P Oorschot, S Vanstone
    Handbook of Applied Cryptography
    CRC Press (Fifth Printing), 2001
    http://cacr.uwaterloo.ca/hac/
  • William Stallings
    Cryptography and Network Security
    Prentice Hall (Fifth Edition), 2010
  • Victor Shoup
    Computational Num Th and Algebra
    Cambridge University Press, 2008
    http://shoup.net/ntb/