Está en la página 1de 1

# PROGRAMA CALENDARIO

## 2025972 Introduccin a la Criptografa y a la

2014
Crditos: 3
Pre-requisito: 2025967 Redes de Computadores, 2016696 Algoritmos
Metodologa: Se introducen los temas tericos, se ven algunas aplicaciones y se desarrolla un trabajo prctico
sobre el tema visto.

Temas:
Semana 1=Introduction to Cryptography (Definition, Goals of Cryptography,Terminology, Common Players)
Semana 2,3=Symmetric Ciphers (Introduction to Notation, Block Ciphers, Substitution Ciphers, Transposition
Ciphers, Product Ciphers)
Semana 4,5=Data Encryption Standard DES (Key Generator, Steps of DES Algorithm, Inner Function f, S-Boxes,
etc.)
Semana 6=Advanced Encryption Standard AES (AES Parameters, Data Representation, Steps of AES Algorithm
(Encryption), Steps of AES Algorithm (Decryption), Key Generator, Galois Field Multiplication)
Semana 7,8,9=Number Theory Background (Division Theorem, Congruent Modulo n, Equivalent Class Modulo n ,
Integer Modulo n (Zn), Multiplicative Inverse, Factorization, GCD, Relatively Prime, Multiplicative Group of Zn, Euler's
Theorem, Fermat's Little Theorem, EEA - Extended Euclidean Algorithm, PowerMod, CRT - Chinese Remainder
Theorem, The Order of an Integer, Primitive Elements in Z *p)
Semana 10,11=Public-key Cryptosystems (RSA, The Discrete Logarithm Problem, ElGamal)
Semana 12=Key Establishment Protocols (Key Transport Vs Key Agreement, Deffie-Hellman Key Exchange, Man-inthe-middle Attack, Shamir's Three-Pass Protocol)
Semana 13,14=Digital Signatures (RSA Signature Scheme, ElGamal Signature Scheme)
Semana 15,16=Identification (Ways of Identification, Zero-Knowledge Identification Protocol, Simplified Feige-FiatShamir Identification Protocol)

## Ponderaciones y fechas de presentacin de pruebas:

1ra Evaluacin

Porcentaje
100pts+40pts(quices)

Grupo 1
31 Marzo 2014

2da Evaluacin

100pts+40pts(quices)

12 Mayo 2014

3ra Evaluacin

100pts+40pts(quices)

9 Junio 2014

Talleres
Total

80pts
500pts

Bibliografa:
J. Buchmann, Introduction to Cryptography (2nd edition), Springer, 2004
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997
B. Schneier, Applied Cryptography (2nd edition), John Wiley & Sons, New York, 1996
R. Rivest, Cryptography, Ch. 13 in Handbook of Theoretical Computer Science, Vol. A (J. van Leeuwen ed.)
Elsevier, 1990
T. Cormen, C. Leiserson, and R. Rivest, Number-Theoretic Algorithms, Ch. 33 in Introduction to Algorithms, MIT
Press, 1990