Secret Key Cryptography (Spring 2004) course
Instructor: Adi Shamir
Teaching assistant: Eran
Tromer
The checked exercises are in the course mailbox.
Resources
For resources marked [library],
there are copies or excerpts reserved at the library.
- Enigma:
- Józef Garliński, Intercept
- The Enigma War, J.M. Dent & Sons Ltd., 1979 [library]
- Andrew Hodges, Alan Turing: The Enigma, Walker & Co, 2000 [library]
- Diagrams and pictures of the Enigma [online]
- U. Feige, A. Fiat, A. Shamir, I. Shimshoni, G. Tardos, Planning and Learning in Permutation Groups,
Proceedings of the 30-th Symposium on Foundations of Computer Science,
Durham, NC, October 1989, 274--279. [slides]
- M. E. Hellman. A cryptanalytic time-memory tradeoff,
IEEE Transactions on Information Theory, IT-26(4), pp. 401-- 406, 1980
[library]
- David
Wagner, A Generalized Birthday Problem, CRYPTO 2002 [paper] [slides]
- P. Oechslin, Making a
faster Cryptanalytic Time-Memory Trade-Off, CRYPTO 2003, LNCS,
vol 2729, pp 617-630, 2003 [paper]
- Alex Biryukov, Adi Shamir, Structural
Cryptanalysis of SASAS, Eurocrypt 2001, pp. 394-405 [paper] [slides]
- Lecture notes: DES [online]
- Resources on DES (mostly overlapping):
- A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography,
CRC Press, 1996. [Chapter
7] sections 7.2.2, 7.2.3, and 7.4.
- Bruce Schneier, Applied
Cryptography, John Wiley & Sons, 1996. Chapters 9.1, 9.2,
9.3, 9.6, 9.8 and 12.
- Eli Biham, Modern Cryptology course lecture notes: Block
Ciphers [lecture]
and [tutorial].
- Differential cryptanalysis:
- Eli Biham, Adi Shamir, Differential
cryptanalysis of DES-like cryptosystems, Technical report
CS90-16, Weizmann Institute of Science (also in Crypto '90 and Journal
of Cryptology, Vol. 4, No. 1, pp. 3-72, 1991) [full
version]
- Eli Biham, Adi Shamir, Differential
Cryptanalysis of the Full 16-Round DES, Crypto 2002, pp.
487--496 [paper] [slides]
- Eli Biham, Adi Shamir, Differential
Cryptanalysis of the Data Encryption Standard, Springer Verlag,
1993 [library]
- Eli Biham, Modern Cryptology course lecture notes: Differential
cryptanalysis [lecture], [tutorial] and [tables].