Back to Full Curriculum
CY501Semester 63 (3-0-0)Major

Advanced Cryptography

Differential cryptanalysis principles and attack complexity, Linear cryptanalysis and correlation matrices, Integral cryptanalysis and multidimensional characteristics, Truncated differential attacks, Impossible diffe...

Syllabus

01

Unit 1: Block Cipher Cryptanalysis

Differential cryptanalysis principles and attack complexity, Linear cryptanalysis and correlation matrices, Integral cryptanalysis and multidimensional characteristics, Truncated differential attacks, Impossible differential cryptanalysis, Boomerang and rectangle attacks, Slide attacks and self-similarity properties, Key schedule cryptanalysis techniques.

02

Unit 2: Stream Ciphers and Sequence Generators

Linear Feedback Shift Registers (LFSRs) and Berlekamp-Massey algorithm, Nonlinear combination generators and correlation immunity, Stream cipher design criteria (period, linear complexity, balance), RC4 analysis (key scheduling biases, WEP attacks), Grain and Trivium stream ciphers, Related-key and distinguishing attacks on stream ciphers.

03

Unit 3: Public-Key Cryptosystems and Attacks

RSA cryptanalysis (factoring algorithms - trial division, Fermat, quadratic sieve, number field sieve), Rabin cryptosystem and square roots modulo composite, Paillier homomorphic encryption, Elliptic Curve Discrete Logarithm Problem (ECDLP), Index calculus attack on elliptic curves, Pairing-based cryptography (bilinear maps, identity-based encryption).

04

Unit 4: Hash Function Design and Cryptanalysis

Merkle-Damgård construction and length extension attacks, Sponge construction (Keccak/SHA-3), Hash function security properties (collision, preimage, second preimage resistance), Differential paths in hash functions, Boomerang distinguishers for compression functions, Multicollision attacks and Joux's attack, Hash-based signatures (Lamport, XMSS).

05

Unit 5: Post-Quantum Cryptography and Advanced Topics

Quantum computing threats (Shor's algorithm, Grover's algorithm), Lattice-based cryptography (Learning With Errors - LWE, Ring-LWE), Code-based cryptography (McEliece cryptosystem), Hash-based signatures (SPHINCS+, LMS), Isogeny-based cryptography, Multivariate polynomial cryptography, NIST PQC standardization process and migration strategies.