20101001_1c171c893ef6cddc7465ClkLnZsOV0i0

advertisement
Field Research on Cryptology
PART I : A GENERAL VIEW OF CRYPTOLOGY
These days I’ve got a great amount of knowledge in Cryptology. Then let me introduce the
situation of cryptology.
Cryptology has two branches, one is classic cryptology while the other one is modern
cryptology. What classic cryptology researches is mainly the conversion of messages from a
comprehensible form into an incomprehensible one and back again at the other end, rendering
it unreadable by interceptors or eavesdroppers without secret knowledge. However, these
kinds of encryption methods are meaningless today.
When it comes to information era, it is possible to create much more complex encryption
methods. Furthermore, computers allowed for the encryption of any kind of data representable
in any binary format, unlike classical ciphers which only encrypted written language texts; this
was new and significant. Computer use has thus supplanted linguistic cryptography, both for
cipher design and cryptanalysis.
Today, cryptology what we usually talk about refers to modern cryptology. There are also
several subfields in it, as is shown below:
·Symmetric-key Cryptography:
A classic kind of encryption method, including block ciphers and stream ciphers
·Public-Key Cryptography:
Encryption methods based on abstract algebra
·Cryptanalysis :
Find the weakness of a certain kind of cryptographic scheme.
·Cryptographic primitives :
The theoretical foundation of encryption method, especially problems related to
mathematics
·Cryptosystems:
Consists of one or more cryptographic primitives, designed to provide particular
functionalities while guaranteeing certain security properties
Among these subfields, cryptographic primitive is an interest of mine. If I major in
cryptographic primitives, I’ll be pushed to work on a lot of mathematics problems, which I had
dreamed of. I’ll get much motivation in the major. Another important case is that I finally found I
have to apply for a computer science master degree no matter in USA or Europe.
PART II : RESEARCH SITUATIONS & HOT TOPICS & FUTURE TREND
I’m quite interested in cryptographic primitives and cryptanalysis. In recent time, most
essays on cipher-attack are aimed at AES-192, AES-256, FOX Block Cipher and MD5.
Cryptographic primitives include, but are not limited to, encryption functions, hash functions,
message authentication codes and digital signatures. Primitives are designed for special
purposes with the aim of accomplishing a number of security goals.
Essays related to cryptographic primitives are always hard to find. Because the people
who write the essay must invent a new mathematical model and prove that his theory will help
in building a new cryptographic scheme. There are so many summaries published every year,
helping me get knowledge of what cryptographic primitives have already exist and how they
were used to build cipher.
PART III : KNOWLEDGE & SKILLS REQUIRED
CRYPTANALYSIS:
-
Strong mathematics skills demonstrated with a minimum of Calculus II and two other
upper level mathematics courses which might include Linear/Matrix Algebra
- Exceptional academic performance
- Strong oral and written skills
- Knowledge in one or more disciplines of computer science with a demonstrated interest
in, and ability to perform hands-on technical work
-
Intelligent and imaginative
CRYPTOGRAPHIC PRIMITIVES:
·Strong mathematics skills
·Strong ability of combining theory and practice
REFERENCES
Chapter 2-5, Modern Cryptography,Yang Bo, Apr. 2010
Cameron McDonald, “Analysis of Modern Cryptography Primitives”, Doctor of Philosophy,
Macquarie University, Jan. 2010.
http://en.wikipedia.org/wiki/Cryptology
http://en.wikipedia.org/wiki/Symmetric-key_algorithm
http://en.wikipedia.org/wiki/Stream_ciphers
http://en.wikipedia.org/wiki/Block_ciphers
http://crypto.cs.uiuc.edu/blog/
Download