This lecture will address Modern Symmetric Cryptography, with focus on common algorithms and cipher modes.
Download here
Mandatory Reading
One of:
- Segurança em Redes Informáticas, A. Zúquete, Chap. 2
- Ross Anderson, Security engineering, Third Edition Chap. 5 and 20.
- Security in Computing, 6th edition, Charles Pfleeger, Shari Lawrence Pfleeger, Lizzie Coles-Kemp, Chap. 2.3
Relevant References
- Confusion and diffusion
- Avalanche effect
- Kerckhoffs’s principle
- Symmetric-key algorithm
- Stream ciphers
- Cryptographically-secure pseudorandom number generator
- Block ciphers
- Feistel cipher (or network)
- S-Box (Substitution box)
- P-Box (Permutation box)
- Substitution-permutation network
- Key schedule
- Data Encryption Standard (DES)
- Advanced Encryption Standard (AES)
- Blowfish
- Block cipher modes of operation
- Padding
- Authenticated encryption
- Triple DES
- Key whitening