Field Research on Cryptology PART I : A GENERAL VIEW OF CRYPTOLOGY These days I’ve got a great amount of knowledge in Cryptology. Then let me introduce the situation of cryptology. Cryptology has two branches, one is classic cryptology while the other one is modern cryptology. What classic cryptology researches is mainly the conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge. However, these kinds of encryption methods are meaningless today. When it comes to information era, it is possible to create much more complex encryption methods. Furthermore, computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant. Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis. Today, cryptology what we usually talk about refers to modern cryptology. There are also several subfields in it, as is shown below: ·Symmetric-key Cryptography: A classic kind of encryption method, including block ciphers and stream ciphers ·Public-Key Cryptography: Encryption methods based on abstract algebra ·Cryptanalysis : Find the weakness of a certain kind of cryptographic scheme. ·Cryptographic primitives : The theoretical foundation of encryption method, especially problems related to mathematics ·Cryptosystems: Consists of one or more cryptographic primitives, designed to provide particular functionalities while guaranteeing certain security properties Among these subfields, cryptographic primitive is an interest of mine. If I major in cryptographic primitives, I’ll be pushed to work on a lot of mathematics problems, which I had dreamed of. I’ll get much motivation in the major. Another important case is that I finally found I have to apply for a computer science master degree no matter in USA or Europe. PART II : RESEARCH SITUATIONS & HOT TOPICS & FUTURE TREND I’m quite interested in cryptographic primitives and cryptanalysis. In recent time, most essays on cipher-attack are aimed at AES-192, AES-256, FOX Block Cipher and MD5. Cryptographic primitives include, but are not limited to, encryption functions, hash functions, message authentication codes and digital signatures. Primitives are designed for special purposes with the aim of accomplishing a number of security goals. Essays related to cryptographic primitives are always hard to find. Because the people who write the essay must invent a new mathematical model and prove that his theory will help in building a new cryptographic scheme. There are so many summaries published every year, helping me get knowledge of what cryptographic primitives have already exist and how they were used to build cipher. PART III : KNOWLEDGE & SKILLS REQUIRED CRYPTANALYSIS: - Strong mathematics skills demonstrated with a minimum of Calculus II and two other upper level mathematics courses which might include Linear/Matrix Algebra - Exceptional academic performance - Strong oral and written skills - Knowledge in one or more disciplines of computer science with a demonstrated interest in, and ability to perform hands-on technical work - Intelligent and imaginative CRYPTOGRAPHIC PRIMITIVES: ·Strong mathematics skills ·Strong ability of combining theory and practice REFERENCES Chapter 2-5, Modern Cryptography,Yang Bo, Apr. 2010 Cameron McDonald, “Analysis of Modern Cryptography Primitives”, Doctor of Philosophy, Macquarie University, Jan. 2010. http://en.wikipedia.org/wiki/Cryptology http://en.wikipedia.org/wiki/Symmetric-key_algorithm http://en.wikipedia.org/wiki/Stream_ciphers http://en.wikipedia.org/wiki/Block_ciphers http://crypto.cs.uiuc.edu/blog/