
Cryptography
Cryptography ResearchDevising a Better Way to Teach and Learn the Advanced Encryption StandardHere is a pedagogical nightmare: How does one describe, explain, and teach the workings of a cryptographic algorithm that was deliberately designed to befuddle would-be code- breakers? Recently, two Santa Clara undergraduates and their math professor developed a much needed approach for introducing an important new encryption standard to students. In the world of cryptography, a term like “secure” is relative, and it is easy to see why. When the U.S. National Bureau of Standards developed the first Data Encryption Standard (DES) in the 1970s, it would have taken a lifetime to defeat it using the fastest computers available at that time. Today, with a specially designed supercomputer, an hour would suffice. Fortunately, during the 1990s a more robust cryptographic method called Triple DES was introduced to keep most of the world’s secrets secret. But now its days, too, are numbered. The U.S. National Institute of Standards and Technology held a competition in 2001 for a new data security algorithm. The winning entry, dubbed the Advanced Encryption Standard (AES), came from a Belgian professor and graduate student. AES is still in the first stages of deployment, but it is proving so hard to defeat that it should serve us well through many generations of ever-speedier new computers. Tougher to Crack, Tougher to Teach
Santa Clara University Associate Professor of Mathematics and Computer Science Ed Schaefer specializes in the field of arithmetic geometry, but he has also earned recognition for work in cryptography. A few years ago a leading data security firm, RSA, hired him to try to crack a new data encryption technique based on elliptic curves. Arithmetic geometry includes the study of elliptic curves—and Schaefer happens to be one of the world’s foremost experts in them. Try as he might, he failed (as others have, since) to defeat elliptic curve codes. The failure had value, however, as it served to increase the perception of elliptic curve cryptography security. Before the RSA project, Schaefer had become known in cryptography circles for a simplified version of DES that he had developed and described in a 1996 paper. Presented in several textbooks, it is regarded as an effective way to teach the notoriously complicated algorithm to students. One professor, who uses simplified DES in his own courses, wrote to Schaefer to ask if he had any plans to simplify AES as well. Schaefer did not at the time, but it got him thinking. Then one day Mohammad Musa and Stephen Wedig—two juniors taking Schaefer’s popular introductory cryptography course—walked into his office and proposed working together on a research project of his choosing. Schaefer had just the thing in mind. The Perfect Team
By contrast, Schaefer describes Musa and Wedig—computer engineering and computer science majors, respectively—as hardware and software experts. “They’re enormously knowledgeable, much more so than typical undergraduates,” Schaefer says. “They contributed a real depth of background on computers and technology implementation issues that I simply didn’t possess.” The paper, titled “A Simplified AES Algorithm and Its Linear and Differential Cryptanalyses,” appeared in April 2003 in Cryptologia, a well-regarded journal in the field. If it is half as successful as Schaefer’s earlier paper on DES, it should prove to be a feather in the caps of his two undergraduate students as they start their professional careers. |