TCS / Teaching / T-79.512

T-79.512 Cryptology: Special Topics

Spring 2002: Provable Security

Schedule

Missing presenter/opponent names means that the corresponding position is still open. (In such cases, the concrete topic might be relocated to a different date.) Missing topic names means that the course has not yet been planned to this far in such a level of details. In preparing your own survey, please use Petteri's .tex file as a formatting example. (See here for the outcomes of T79-511 the last semester.)

During this semester, we will cover the next topics:

A few links that aim to relevant papers are: http://www.adastral.ucl.ac.uk/~helger/crypto/link/block/theory.html (first few lectures), http://www.adastral.ucl.ac.uk/~helger/crypto/link/block/modes.html (AONT, authenticated encryption, middle and last lectures), http://www.adastral.ucl.ac.uk/~helger/crypto/link/block/estonian_ws.html (last lectures), http://www.adastral.ucl.ac.uk/~helger/crypto/link/hash/ (see: block cipher to hash function conversions, UOHWFs), http://www.adastral.ucl.ac.uk/~helger/crypto/link/hash/mac.html and some others. A good but slightly outdated survey is ``Practice-oriented provable-security'' by Mihir Bellare. The homepages of Mihir Bellare and Phillip Rogaway (see OCB, UMAC, PMAC) contain more relevant information.

For a related course see 6.875/18.425: Cryptography and Cryptanalysis Lecture notes (MIT).

Preliminary schedule follows. Exact publications etc will be changed.
DateSubjectMaterialsPresenterOpponentSuggested reading
22.01.2002Course introduction. Giving the assignments
Introduction to PRP & PRFHelger Lipmaa(Bellare-Goldwasser lecture notes)
05.02.2002OWP to PRG and PRG to PRF constructions.ps.gzJan-Erik EkbergJohan Wallén(..., [GGM])
Special assignment: Oleg Mürk, ``Optimal Distinguisher of Random Functions and Random Permutations'', .ps
12.02.2002PRF to PRP constructionJohan WallénPetteri Kaski The original Luby-Rackoff paper, On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited (Naor, Reingold), block ciphers Bear and Lion, Two papers by Ramzan et al.
19.02.2002PRF to PRP construction, IIPetteri KaskiJan-Erik Ekberg
26.02.2002PRP to PRF constructions, I.ps.gzOleg MürkAlexey Vyskubov(Bellare-Krovetz-Rogaway)
05.03.2002No lecture
12.03.2002No lecture
19.03.2002PRP to PRF constructions, II .ps.gzLauri TarkkalaOleg Mürk (.ps.gz)(Bellare-Impagliazzo, Lucks)
09.04.2002Security of block cipher modes: security notionsAlexey VyskubovLauri Tarkkala(Bellare-Desai-Jokipii-Rogaway)
Security of block cipher modes: concrete modesJohan Wallén?
09.04.2002All-or-Nothing TransformsPhD thesis of Dodis
16.04.2002Block cipher to hash function conversions(Knudsen-Lai-Preneel, Knudsen-Preneel)
23.04.2002UOHWF. Square HashSee http://www.adastral.ucl.ac.uk/~helger/crypto/link/hash/
??.??.2002Authenticated EncryptionThe OCB paper by Rogaway

The choice of the topics is to be specified. If you have a topic yourself, please let me know.

Useful literature:


Latest update: January 14, 2001 by helger@tcs.hut.fi