ECS228: Cryptography for Electronic Commerce (Winter 2004)



Lectures:: TuTh 1:40-3:00PM, 80 Soc Sci
Office Hours: By appointment.

Course Description: Cryptographic primitives and protocols of importance to e-commerce present and future. In particular, our focus this time will be on key management issues (broadly defined).

Course Notes: "New Directions in Key Management". See me for a hardcopy of these notes (I will hand it out at the first meeting of the class). They are still very much in draft form, so I will not make them available in electronic form.

Course Project: Write up a short paper (5--10 pages) on a closer look at one of the main class topics, or any other topic approved by the instructor). Focus on what you consider to be the most interesting open research questions.

Homework: There may be occasional homework assignments. A typical assignement will be to turn in a very brief write-up summarizing some research idea we are covering.

Extra Credit: Find bugs small and large in the Course Notes for extra credit!

Outline of Topics:

1. Introduction 1.1 Cryptography Basics 1.2 Number Theory Basics 1.3 RSA Review 1.4 Key Distribution Protocols 1.5 Key Management Basics

2. Threshold Cryptography for Distributed Key Management 2.1 Ordinary RSA Key Generation 2.2 Secret Sharing 2.3 Two-out-of-Two Threshold RSA 2.4 Proactive Security 2.5 Distributed Generation Without a Dealer 2.6 Capture-Resilient Devices with Key Disabling 2.7 Generalizations and Variations

3. Pairings-Based Cryptographic Key Managemnet 3.1 Pairings and the Bilinear Diffie-Hellman Assumption 3.2 Identity-Based Encryption 3.3 Forward Secure Encryption 3.4 Intrusion-Resilient Encryption 3.5 Related Work

4. Piracy Protection for Key Management 4.1 Combinatorial Traitor Tracing Schemes 4.2 Public Key Traitor Tracing Schemes 4.3 Trace and Revoke Schemes 4.4 Signets for Piracy Deterrence

5. Implementation Attacks on Key Management 5.1 Bleichenbacher's Attack on PKCS #1 5.2 Side Channel Attacks 5.3 Random Fault Induction Attacks 5.4 Covert Black Box Attacks