Pick one topic from the list below, or choose your own. If you choose your own topic, it must be of sufficient complexity and quality to compare with the topics listed below.
You will be asked to form groups of one, two, or three individuals, with number and quality of groups commensurate with the topic chosen. We suggest you cluster as one grad student and one or two undergrads. The grad student can lead theory development and software design, and the undergrads can help with theory and do software design and implementation.
The list of individuals in your group, as well as your chosen group topic, are listed in Project-4 Teams . If you want to change groups before your proposal is submitted, you may (with instructor permission). Otherwise, plan to stay with your group.
In addition to the choice of topic, tasks in this project will include:
We have chosen the following topics to reflect areas of current interest in cryptology:
-e
(-d
) for an encryption (decryption)
program; -a plaintext-alphabet
(optional).-p plaintext
;-c ciphertext
;-k key
;-i input-file
(optional); and-o output-file
(optional). man
pages in UNIX. You can work together
to determine the format that you use, but please do your own
pages. It would be nice if everyone used the same format.
Biham, E. and A. Shamir. "Differential cryptanalysis of DES-like cryptosystems", Journal of Cryptology 4:3-72 (1991).
Biham, E. and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard, New York: Springer-Verlag (1993).
Biham, E. and A. Shamir. "Differential Cryptanalysis of the Full 16-round DES", Advances in Cryptology -- Proceedings of CRYPTO '92 also published as Lecture Notes in Computer Science (New York: Springer-Verlag) 740:494-502 (1993).
Brickell, E.F., J.H. Moore, and M.R. Purtill. "Structure in the S-boxes of DES", in Advances in Cryptology -- Proceedings of CRYPTO '86 also published as Lecture Notes in Computer Science (New York: Springer-Verlag) 263:3-8 (1987).
Matsui, M. "Linear cryptanalysis method for DES cipher", in Advances in Cryptology -- Proceedings of EUROCRYPT '93 also published as Lecture Notes in Computer Science (New York: Springer-Verlag) 765:386-397 (1994).
Matsui, M. "The first experimental cryptanalysis of the data encryption standard", in Advances in Cryptology -- Proceedings of CRYPTO '94 also published as Lecture Notes in Computer Science (New York: Springer-Verlag) 839:1;11 (1994).
Dr. Nemo has posted some interesting information. Look in Project-4 GSS/API References.
Of particular interest is RFC1508.
Blum, L., M. Blum, and M. Shub. "A simple, unpredictable random number generator", SIAM Journal on Computing 15:364-383 (1986).
Blum, M. and S. Micali. "How to generate cryptographically strong sequences of psuedo-random bits", SIAM Journal on Computing 13:850-864 (1984).
Boyar, J. "Inferring sequences produced by pseudo-random numbers", Journal of ACM 36:129-141 (1989).
Haas, A. "The Multiple Prime Random Number Generator", ACM Transactions on Mathematical Software 13:368-81 (1987).
Herring, C. and J.I. Palmore. "Random number generators are chaotic", Communications of the ACM 38:121-122 (1995).
Lagarias, J.C. "Pseudo-random number generators in cryptography and number theory", in Cryptology and Computational Number Theory, pp. 115-143, American Mathematical Society (1990).
Lin, K.Y., B. Krishna, and H. Krishna. "Rings, fields, the Chinese remainder theorem and an extension", IEEE Transactions on Circuits and Systems. Part II, Analog and Digital Signal Processing 41:641-655 (1994).
Vazirani, U. and V. Vasirani. "Efficient and secure pseudorandom number generation", in Proceedings of the 25th Annual Symposium on the Foundations of Computer Science (IEEE Press), pp.458-463 (1984).
Anon. "Mathematicians calculate largest prime number", New Scientist 123:31 (1989).
Apostol, T.M. Introduction to Analytic Number Theory, New York: Springer-Verlag (1976).
Bach, E. Analytic Methods in the Analysis and Design of Number- theoretic Algorithms, Cambridge, MA: MIT Press (1985).
Beauchemin, P., G. Brassard, C. Crepeau, C. Gouthier, and C. Pomerance. "The generation of random numbers that are probably prime", Journal of Cryptology 1:53-64 (1988).
Damgard, I.B. P. Landrock, and C. Pomerance. "Average case error estimates for the strong probable prime test", Mathematics of Computation 61:177-194 (1993).
Davenport, H. Multiplicative Number Theory, New York: Springer-Verlag (1980).
Dhavakodi, S.T. "On the parity of the number of small prime factors of integers", Ph.D. Dissertation, University of Florida (1992).
Estermann, T. Introduction to Modern Prime Number Theory, Cambridge University Press (1961).
Garfinkel, S. "A prime patent: legal rights to a number upset programmers and lawyers", Scientific American 273:30 (1995).
Kranakis, E. Primality and Cryptography, New York: Wiley (1986).
Motohashi, Y. Lectures on Sieve Methods and Prime Number Theory, New York: Springer (1983).
Rabin, M.O. "Probabilistic algorithms for testing primality", Journal of Number Theory 12:128-138 (1980).
Ribenboim, P. The Book of Prime Number Records, New York: Springer-Verlag (1988).
Solovay, R. and V. Strassen. "A fast Monte Carlo test for primality", SIAM Journal on Computing 6:84-85 (1977).
Alexi, W., B. Chor, O. Coldrich, and C.P. Schnorr. "RSA and Rabin functions: certain parts are as hard as the whole", SIAM Journal on Computing 17:194-209 (1988).
Bressoud, D.M. Factorization and Primality Testing, New York: Springer-Verlag (1989).XS
Campbell, J. "Sharing the secret to scientific problem solving", Electronics World & Wireless World 100:627-628 (1994).
Davis, D.N. "The prime discriminant factorization of discriminants of algebraic number fields", Ph.D. Dissertation, University of Florida, Department of Mathematics (1978).
DeLaurentis, J.M. "A further weakness in the common-modulus protocol for the RSA cryptosystem", Cryptologia 8:253-259 (1984).
Heath, D.J. "An application of the calculus of communicating systems to the prime factorization problem", Information and Software Technology 35:474-478 (1993).
Kleiner, K. "Squeamish ossifrage dents electronic armour", New Scientist 142:5 (1994).
Koblitz, N. "Elliptic curve cryptosystems", Mathematics of Computation 48:203-209 (1987).
Kranakis, E. Primality and Cryptography, New York: Wiley (1986).
Lenstra, A.K. and H.W. Lenstra (Eds.) The Development of the Number Field Sieve, Lecture Notes in Mathematics 1554, New York: Springer-Verlag (1993).XS
Menezes, A.M. Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers (1993).
Menezes, A.J. and S.A. Vanstone. "Elliptic curve cryptosystems and their implementation", Journal of Cryptology 6:209-224 (1993).
Ruthen, R. "Factoring googols; computers on three continents factor an elusive number", Scientific American 259:22 (1988).
Taubes, G. "Small army of code-breakers conquers a 129-digit giant", Science 264:776-777 (1994).
This concludes the preliminary description for Project #4.