Jump to content

COL759: Difference between revisions

From IITD Wiki
[checked revision][checked revision]
Creating course page via bot
 
Bot: wrap bare course codes in wikilinks
 
Line 4: Line 4:
| credits = 3
| credits = 3
| credit_structure = 3-0-0
| credit_structure = 3-0-0
| pre_requisites = COL351, MTL106 OR Equivalent
| pre_requisites = [[COL351]], [[MTL106]] OR Equivalent
| overlaps = MTL730
| overlaps = [[MTL730]]
}}
}}


== COL759 : Cryptography & Computer Security ==
== COL759 : Cryptography & Computer Security ==
Part 1: Foundations: Perfect secrecy and its limitations, computational security, pseudorandom generators and one time encryption, pseudorandom functions, one way permutations, message authentication and cryptographic hash functions. Part 2: Basic Constructions and proofs: Some number theory, symmetric key encryption, public key encryption, CPA and CCA security, digital signatures, oblivious transfer, secure multiparty computation. Part 3: Advanced Topics: Zero knowledge proofs, identity based encryption, broadcast encryption, homomorphic encryption, lattice based cryptography.
Part 1: Foundations: Perfect secrecy and its limitations, computational security, pseudorandom generators and one time encryption, pseudorandom functions, one way permutations, message authentication and cryptographic hash functions. Part 2: Basic Constructions and proofs: Some number theory, symmetric key encryption, public key encryption, CPA and CCA security, digital signatures, oblivious transfer, secure multiparty computation. Part 3: Advanced Topics: Zero knowledge proofs, identity based encryption, broadcast encryption, homomorphic encryption, lattice based cryptography.

Latest revision as of 16:26, 14 April 2026

COL759
Cryptography & Computer Security
Credits 3
Structure 3-0-0
Pre-requisites COL351, MTL106 OR Equivalent
Overlaps MTL730

COL759 : Cryptography & Computer Security

Part 1: Foundations: Perfect secrecy and its limitations, computational security, pseudorandom generators and one time encryption, pseudorandom functions, one way permutations, message authentication and cryptographic hash functions. Part 2: Basic Constructions and proofs: Some number theory, symmetric key encryption, public key encryption, CPA and CCA security, digital signatures, oblivious transfer, secure multiparty computation. Part 3: Advanced Topics: Zero knowledge proofs, identity based encryption, broadcast encryption, homomorphic encryption, lattice based cryptography.