Cryptographic protocols allow a group of people to communicate, plot,
and perform intensively complex tasks even if there is no trust amongst
them. Such protocols allow the creation of unforgeable electronic
documents (via digital signatures), the creation of electronic
checks (that cannot be copied), the ability to do all or nothing
disclosures (“I will tell you only if you tell me”) and a
plethora of such important functions; all the way up to digital cash (untraceable,
unforgeable electronic currency). Cryptographic protocols are
incredibly important in today’s wired world. Use of cryptography allows
trusted communications trusted electronic commerce and prevention of
fraud on the Internet community.
The course covers three major topics: Cryptographic
Algorithms, Cryptographic Protocols and Cryptographic Techniques. The
algorithms embody the art of encryption. The cryptographic protocols
will expose the audience to the fascinating world of building trust on
untrusted relationships. And finally the Cryptographic Techniques will
discuss the methodology used in key management and algorithm choice.