Introduction to Cryptography and Data Security

Introduction to Cryptography and Data Security (Ruhr University Bochum). Instructor: Professor Christof Paar. This is a series of lectures on cryptography that was taught in the 2010/2011 academic year at Ruhr University Bochum. The lectures give a fairly comprehensive introduction to modern applied cryptography. Topics include: Advanced Encryption Standard (AES), Data Encryption Standard (DES), RSA Cryptosystem, Diffie-Hellman Key Exchange, Elliptic Curve Cryptography (ECC), Digital Signatures, and the SHA hash function family.


Lecture 01 - Introduction to Cryptography
Lecture 02 - Modular Arithmetic and Historical Ciphers
Lecture 03 - Stream Ciphers, Random Numbers and One Time Pad
Lecture 04 - Stream Ciphers and Linear Feedback Shift Registers
Lecture 05 - Data Encryption Standard (DES): Encryption
Lecture 06 - Data Encryption Standard (DES): Key Schedule and Decryption
Lecture 07 - Introduction to Galois Fields for the AES
Lecture 08 - Advanced Encryption Standard (AES)
Lecture 09 - Modes of Operation for Block Ciphers
Lecture 10 - Multiple Encryption and Brute-Force Attacks
Lecture 11 - Number Theory for PKC: Euclidean Algorithm, Euler's Phi Function & Euler's Theorem
Lecture 12 - The RSA Cryptosystem and Efficient Exponentiation
Lecture 13 - Diffie-Hellman Key Exchange and the Discrete Log Problem
Lecture 14 - The Generalized Discrete Log Problem and the Security of Diffie-Hellman
Lecture 15 - Elgamal Encryption Scheme
Lecture 16 - Introduction to Elliptic Curves
Lecture 17 - Elliptic Curve Cryptography (ECC)
Lecture 18 - Digital Signatures and Security Services
Lecture 19 - Elgamal Digital Signature
Lecture 20 - Hash Functions
Lecture 21 - SHA-1 Hash Function
Lecture 22 - MAC (Message Authentication Codes) and HMAC
Lecture 23 - Symmetric Key Establishment and Kerberos
Lecture 24 - Man-in-the-middle Attack, Certificates and PKI

Understanding Cryptography
Cryptography Textbook. Online Course: Slides; Videos. Cryptography has crept into everything, from web browsers and email programs to cell phones, bank cards, cars and even into medical implants.