Day 1 
1. 
Mission Statements 

1 hours 

This module deals explains the basic ideas and tenets of cryptography. Goals and mission statements
 Principles
 Terminology
 Encryption
 Authentication
 Attestation

2. 
Simple Ciphers 

3 hours 

Putting the principles and nomenclature into practice with historical ciphers that (at least at one time) were considered state of the art..
 Monoalphabetic Ciphers (example: Caesar)
 Polyalphabetic Ciphers (examples: Vigenere, Hill)
 Transposition Ciphers
 Basic Cryptanalysis and Statistics

3. 
Information Theory basics 

23 hours 

Exploring Claude Shannon's landmarks principles of entropy and cryptanalysis
 Entropy
 Redundancy and Unicity Distance
 Chosen/Known Plaintext/Ciphertext attacks
 Complexity Theory
 P, NP, NPComplete

Day 2 
5. 
Prelude: Randomness 

2 hours 

Explaining the importance of random number generation in cryptography
 Randomness and pseudorandomness
 PRNG algorithms
 Phase space analysis and attractors/fractals
 Case study: TCP sequence numbers
 Stream Ciphers  LSFR
 Case Study: RC4
 Block Cipher modes (ECB, CBC, Counter)

6. 
The (former) Data Encryption Standard 

2 hours 

Taking DES as a case study of one of the world's most popular algorithms, having survived for over two decades but now deemed entirely insecure.
 DES
 FIPS 46
 Differential cryptanalysis attacks
 Triple DES

7. 
The Advanced Encryption Standard 

3 hours 

Taking AES as a case study of the current standard, and a modern (19902000) algorithm
 Rijndael
 FIPS 197
 S Boxes and P Boxes
 Hardware implementations and chiplevel acceleration
 Application: Disk encryption (AESXTS in Linux DMCrypt and certain filesystems)

Day 3 
8. 
Number Theory, in a nutshell 

2 hours 

This module deals with the basic concepts of number theory and advanced algebra which drive public key algorithms
 Modular Arithmetic
 Prime Numbers and Primality Testing
 Sets and Fields
 Chinese Remainder Theorem
 Fermat's Little Theorem

9. 
Diffie Hellman 

1 hours 

Explicating the principles of DiffieHellman Key Exchange (agreement) algorithm
 Basic ideas of key exchange
 Inefficient  the three way handshake
 Diffie HellmanMerkle


Rivest Shamir Adleman Algorithm
 Algorithm
 Attacks/Cryptanalysis
 PKCS
 Variants (elGamal, etc)
 Blum Blum Shub as a secure PRNG


An introduction to Elliptic Curve Cryptosystems, which provide an alternative substrate to PKI , particularly in embedded systems
 Elliptic Curves
 Applications as fields
 Applying Diffie Hellman over ECC

Day 4 
12. 
Hash Functions 

2 hours 

Basic theory of hash functions, with applications
 What makes for a good hash?
 Hash Collisions
 Second Preimage attacks
 The Birthday Paradox
 Case Study (insecure): MD5
 Case Study (more secure): SHA1
 Case Study (standard): SHA256
 The road ahead: SHAng
 Application: Merkle Trees and Linux DMVerity (used for disk authentication)
 Application: FSVerity (Filesystem authenticaiton in Android)

13. 
Digital Signatures and certificates 

2 hours 

Applying PKI + Hash functions for digital signatures and certificates
 Constructing a digital signature
 RSA, DSA and ElGamal signing
 Subliminal channels and key leaks

14. 
Zero Knowledge Proofs 

2 hours 

How do you prove you know something, without revealing what that 'something' is?
 Harnessing probability
 GuillouQuisquater
 Zero Knowledge Proofs
 FeigeFiatShamir
 Blind Signatures
 Playing poker without a deck of cards (but with a LOT of math..)

15. 
Advanced Topics 

2 hours 

A brief tour of topics at the forefront of cryptography
 Visual Secret Sharing
 Steganography
 Secret Sharing
 Anonymous Broadcasts
 Unbreakable channels: Quantum Cryptography
 The threat to modern day algorithms: Quantum Computing

Day 5 
16. 
Real World Applications 

4 hours 

A discussion putting the four days of theory into realworld practice. Topics include:
 Networking Protocol: SSL/TLS
 Networking Protocol: IPSec (AH, ESP, IKEv2)
 Application: PGP, S/MIME

17. 
Cryptocurrency 

3 hours 

A discussion of the theory and practice of cryptocurrency, inspired by Satoshi Nakamoto's seminal work
 The original White Paper
 Block Chaining
 Ethereum as an improvement over the original BTC
 Proofs of stake vs. Proofs of ownership
 Evaluating altcoins
