CCS 130H Explorations in Cryptography
College of Creative Studies
University of California Santa Barbara
http://koclab.cs.ucsb.edu/teaching/ccs130h
Announcements
- Instructor: Professor Çetin Kaya Koç
→ Koç is pronounced as "Coach"
- Class Schedule and Room: Friday 3:00-5:30pm, CRST 0143
Course Notes for 2018
- Papers, Notes, Slides, and Chapters: 2018
Course Notes and Projects for 2017-2013
- Papers, Notes, Slides, and Chapters: 2017
- Papers, Notes, Slides, and Chapters: 2016
- Papers, Notes, Slides, and Chapters: 2014
- Homework Assignment 1: hw1.html -
due 11pm, Sunday, November 16
- Homework Assignment 2: hw2.html -
due 11pm, Sunday, December 7
- Project idea: Read, understand, implement, demo & critique
this
- Papers, Notes, Slides, and Chapters: 2013
- Elliptic Curve Formulae Database:
URL
- We form project groups and perform research and
development in cryptography.
- This year's subject is "Elliptic Curve Cryptography
and Random Number Generators".
Past Project Topics
See the projects directory: projects
- Placing and detecting hardware Trojans
- Standard curves, their properties, and implementations
- Random curves, generation and counting, and implementations
- Protocols (all of them) and their implementations
- Finite fields, properties and implementations: GF(p), GF(2^k),
and GF(p^k) for small or large p
Course Related Documents
Material from Last Years (Still Relevant)
- Public-Key Cryptography
PDF
- The Status of P Versus NP Problem
PDF
- Elliptic Curve Cryptography
PDF
- ECDSA Short Paper
PDF
- ECDSA Long Paper
PDF
- ECDSA Standard Document
PDF
- Cryptanalysis and Key Length Issues
PDF
- Introduction to DES & AES and Efficient Software Implementations
PDF
- Public-Key Cryptography and Hardware/Software Realizations
PDF
- Random Number Generators for Cryptographic Applications
PDF
- Side-Channel Attacks and Countermeasures
PDF
- Message Authentication and Hash Functions
PDF1
PDF2
- Cryptographic Algorithms and Key Size Issues
PDF
- Secure Hash Standard
PDF
- Differential Cryptanalysis
PDF
Hash Function Project Links
Other Project Topics, Documents, Links, and Groups
- 01 Elliptic curve cryptography; protocols and implementations
- 02 Spectral arithmetic for cryptography; analysis and implementations
- 03 Physical signatures and physically unclonable functions
- 04 Cryptography for tiny devices (RFID and all that)
- 05 Super fast cryptography for large systems (SSL, IPSec)
- 06 Side-channel attacks on general-purpose computers
- 07 True random number generators and their properties
- 08 Quantum random number generators and quantum cryptography
- 09 Embedded cryptography implementations
- 10 Cryptanalyzing things but staying legal if possible
- 11 Past, current and future controversial issues with cryptography
- 12 Projects suggested by our colleagues in the industry
Conferences and Proceedings
Other Links
Description
Cryptography is the art and science of designing encryption algorithms
for the purpose of providing private and authenticated communication.
Once a sub-field of military communications, cryptography has gone
mainstream since 1976 with the invention of public-key cryptography
which allows two parties who previously have never met to establish a
secure channel between them. Techniques, mechanisms, and tools of
cryptography are used today for network security, digital signatures,
and privacy in computer systems ranging from tiny RFID tags to large
servers.
This is a project-oriented course, to explore cryptographic
methods and algorithms such as secret-key and public-key encryption
algorithms, hash functions, digital signatures, deterministic and
true random number generators. We are particularly interested in
actual software and hardware realizations of cryptosystems and their
secure implementations, rather than idealized, mathematical proofs of
security.
Students taking this course will form small teams to work on their
selected projects, while following the lectures given by the Instructor
and at the same time scrutinizing the projects of other teams.
Course Material
- Course notes, papers, and technical reports are distributed in class
and via the web.
Grading Rules
We follow CCS rules.
Prerequisites
Open to all majors in CCS.
Academic
Integrity at UCSB ←
Dr. Çetin Kaya Koç
|