[2458] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Cryptography Short Course

daemon@ATHENA.MIT.EDU (Robert Hettinga)
Thu Apr 9 16:12:56 1998

Date: Thu, 9 Apr 1998 11:21:56 -0400
To: cryptography@c2.net
From: Robert Hettinga <rah@shipwright.com>


--- begin forwarded text


X-Authentication-Warning: goya.WPI.EDU: christof owned process doing -bs
Date: Thu, 9 Apr 1998 10:09:10 -0400 (EDT)
From: Christof Paar <christof@ece.WPI.EDU>
To: DCSB <dcsb@ai.mit.edu>
Subject: Cryptography Short Course
MIME-Version: 1.0
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Christof Paar <christof@ece.WPI.EDU>

WPI's Continuing Education Program is offering a 4-day short course in
cryptography. I will be teaching the course on June 11+12 and June 18+19
in Waltham. Waltham is 10 miles West of Boston.

Please find below a detailed course description and a registration form.

If you have any technical questions about course contents etc., please
feel free to contact me by email.

If you have further questions regarding registration, contact gacyr@wpi.edu.

Best regards,

Christof

*************************************************************************
Christof Paar                   http://ee.wpi.edu/People/faculty/cxp.html
Assistant Professor             email:  christof@ece.wpi.edu
Cryptography Group              phone:  (508) 831 5061
ECE Department, WPI             fax:    (508) 831 5491
100 Institute Road
Worcester, MA 01609, USA
*************************************************************************



-----------------------------------------------------------------------
           Worcester Polytechnic Institute
                 4-Day Short Course

        APPLIED CRYPTOGRAPHY AND DATA SECURITY

          Seminar Leader: Dr. Christof Paar


Many of today's information technology applications have data security as a
central system requirement. Applications such as (wireless) computer
networks, electronic commerce, and many www applications rely heavily on a
high degree of system security.

This four-day course will provide you with an in-depth introduction to the
field of applied cryptography. Virtually all important aspects of public-key
and private-key algorithms as well as protocols will be introduced. The
course keeps the theoretical background and technical applications
well-balanced. You will leave the course with a solid, broad knowledge of
state-of-the-arts cryptography. You will have skills to carefully choose and
design a security scheme for a given application.

Background Note: The seminar is based on a highly successful course which
has been taught to more than 200 professionals in industry and graduate
students on campus. The course was previously taught at the NASA Lewis



                  COURSE OUTLINE

Day 1, AM - Introduction

Principles of cryptography. Classical algorithms. Attacks on
cryptographic systems. Stream ciphers. Pseudo-random generators. One-time
pads.


Day 1, PM - Private-key algorithms

Data Encryption Standard (DES): Function, performance, implementation,
security. Overview on other modern block ciphers. Key length and long-term
security.


Day 2, AM - Private-key algorithms

Operation modes of block ciphers. Multiple encryption. Key whitening.


Day 2, PM - Usage of private key-algorithms

Introduction. One-way functions. Some number theory. RSA: Function,
performance, implementation, security. Recent attacks.


Day 3, AM - Public-key cryptography

The generalized discrete logarithm problem. Diffie-Hellman key exchange.
ElGamal encryption.


Day 3, PM - Public-key algorithms

Elliptic curve cryptosystems. Current attacks and security estimations for
Diffie-Hellman, DSA, and elliptic curve systems.


Day 4, AM - Protocols

Digital Signatures. Hash Functions. Security Services: Privacy,
authentication, integrity, identification, non-repudiation.


Day 4, PM - Key distribution and Identification

Key distribution protocols: Principle of Kerberos, certificates, trusted
authorities.  Smart Cards. Identification:  Challenge-and-response
protocols. Course summary.


                  WHO SHOULD ATTEND

Engineers and other technical professional who develop, implement, or
assess information security applications in software or hardware.
Technical managers who need a solid understanding of data security
issues will also greatly benefit from the course.


                 ABOUT THE INSTRUCTOR

Dr. Christof Paar leads the Cryptography and Information Security (CRIS)
labs at WPI's ECE Department. His research interests include security issues
in wireless and ATM networks, efficient algorithms for elliptic and
hyperelliptic curve systems, and hardware implementation of cryptosystems.
For a detailed description of the CRIS labs see
http://ee.wpi.edu/Research/crypt/


                 DATES AND LOCATIONS

June 11+12 and June 18+19, 1998, in Waltham, MA (10 miles from Boston)


                  FEE

$1795 for first registration

$1625 for subsequent registrations



--------------------- print and cut here -----------------------------

           WPI CONTINUING EDUCATION REGISTRATION FORM

Please print out, complete, and return this form to

  Office of Continuing Education, WPI, Worcester, MA 01609-2280,
  call (508) 831-5517 or FAX this form to (508) 831-5694.

Make copies of this form for multiple registrations.


Title of Seminar: APPLIED CRYPTOGRAPHY AND DATA SECURITY

Date of Seminar: June 11+12, June 18+19, 1998, WPI Waltham Campus, Waltham, MA


Name (Mr.)(Ms.) ___________________________________________________

Title _____________________________________________________________

Organization ______________________________________________________

Business Address __________________________________________________

City _______________________________________

State ________ Zip _________________________

Business Phone  ____________________________

FAX  _____________________

Home Phone  ______________


Fee Enclosed (Make checks payable to WPI) ______

Bill my Company, P.O.# __________

Please charge my:     VISA   Mastercard   Discover

  Name on card ________________________________________________

  Exp. date _____________________

  Card # ______________________________________________________

  Signature ___________________________________________________




For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/



home help back first fref pref prev next nref lref last post