Tortoise
Security through barriers.
Yale University Department of Computer Science
CS 467: Cryptography and Computer Security
Michael J. Fischer

Resources, Fall 2020
 
CS Department CS Courses M. Fischer Home M. Fischer Email
Course Home
Syllabus
Handouts
Lecture Notes
Resources
Old Announcements

<< Back
Gloves
Gloves from a space suit.
Pupae
Butterflys grow safely inside.
The Jefferson wheel.
JeffersonWheel
An early encoding device.
Entrance to a Ming Dynasty tomb, north of Beijing, China
Approach
A securable approach to an underground tomb.
Warrior

Recommended supplementary reading (not required)

Cryptography and Security

  • Christof Paar and Jan Pelzl, Understanding Cryptography, Springer, 2010, ISBN-13: 978--3--642--04100--6, ISBN-10: 364204100.
    This is our primary textbook, at least for the first part of the course. It is available for free through the Yale library.

  • Wade Trappe and Lawrence C. Washington, Introduction to Cryptography with Coding Theory, Second Edition, Pearson, 2006, ISBN-10: 0131862391, ISBN-13: 9780131862395. Suggested retail price: $141.33. Google product search lists a variety of sellers of new and used copies at varying prices.

  • Bruce Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, Inc., 1996, ISBN 0-471-11709-9 (paperback).
    Contains a wealth of timely information and gives broad coverage of the field. Often glosses over details in favor of readability, and sometimes gets the details wrong. There are also many errors, particularly before the 5th printing. An errata sheet is available at http://www.counterpane.com/ac2errv30.html.

  • Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, Prentice-Hall PTR, 2002, ISBN 0-13-046019-2.
    Gives a nice account of practical security issues and motivates much of the material that we will be studying.

  • Douglas R. Stinson, Cryptography: Theory and Practice, Third Edition, Chapman & Hall/CRC, 2005, ISBN-10: 1-58488-508-4; ISBN-13: 978-58488-508-5.
    Gives a nice treatment of some of the more mathematical and lower-level aspects of cryptography. The opening chapters give a particularly nice account of classical cryptography and cryptanalysis.

  • Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997, pp. 816, ISBN 0849385237.
    This tome has similar coverage to Schneier but is much more rigorous (at the cost of readability). It is an invaluable reference book if you want to actually implement any of these methods.

  • Wenbo Mao, Modern Cryptography: Theory & Practice}, Prentice-Hall, 2004, ISBN 0--13--066943--1.
    This book is a must for anyone wanting to implement cryptographic algorithms for use in the real world. As well as presenting the principles of cryptography, it also points out many of the subtle real-world issues that can lead to problems with implementations of otherwise-sound algorithms.

  • Shafi Goldwasser and Mihir Bellare, Lecture Notes on Cryptography, 2008. This book from two top cryptographers gives a rigorous mathematical treatment of many of the topics that we will be presenting.

  • Nigel P. Smart, Cryptography, An Introduction: Third Addition.

  • Jonathan Katz and Yehuda Lindell,
    Introduction to Modern Cryptography: Second Edition, Chapman & Hall/CRC, 2014, ISBN 978-1-46657-026-9.
    This book presents cryptography according to the principles of modern cryptography: formal definitions, precise assumptions, and proofs of security. It is mathematically more difficult than the most of the books mentioned above but rewarding to those who can handle the required level of formalism and rigor.
  • Kościelny, Czesław, Kurkowski, Mirosław, Srebrny, Marian, Modern Cryptography Primer, Springer, 2013, ISBN 978--3--642--41386--5.
    This book closely tracks the first part of the course but from a more theoretical point of view.

  • Privacy and Social Issues

    While this is not a social sciences course, the subject matter of this course has major policy implications, particularly with respect to privacy on the internet. The books listed below give some background and insight into social issues that are currently the subject of wide debate.

    The GNU Multiprecision Arithmetic Library (GMP)

    This package contains efficient routines for performing arbitrary-precision arithmetic. The functions most relevant for this course are the mpz functions, which operate on large signed integers. GMP is installed on the Zoo. Type info gmp for documentation. More information is available at gmplib.org

    Other Resources on the Web

    Ron Rivest (the "R" of RSA) maintains an index of links to a wealth of information on cryptography and security.

    The USACM Encryption Policy Library contains pointers to policy debates, position papers, and pending legislation concerning encryption and computer security.

    Bruce Schneier publishes a monthly cryptograpy newsletter, Crypto-gram. This is a good source of news on the current state of computer security and cryptography policy.

    The DES Standard (withdrawn) at the NIST web site.

    The AES Standard at the NIST web site.

Comments about this website should be directed to M. Fischer