N^{o} |
Date | Subject | CBDM | SSS | ZK | HAC |
---|---|---|---|---|---|---|

C1 | Nov 25 | Introduction, Attacks, Unicity | Hf 1 | Sti Ch 1, Ch 2 | Kap 1, 2 | Sec 1.2, 1.4, 1.5, 1.13, 7.3. |

W1 | Nov 25 | Elgamal workshop, projects | ||||

C2 | Nov 27 | Data Encryption Standard | Hf 2 | Sti Ch 3 | Kap 3 | Sec 7.4, Hel80 |

C3 | Dec 2 | Stream Ciphers | Hf 3 | Sti 3.5, Sch 15.1, 8.4, BSW00 | Sec 6.1, 6.2, 6.3, BSW00 | |

W2 | Dec 2 | Symmetric Encryption | Exercises | |||

C4 | Dec 4 | Numbers: properties | Hf 4 | Sti 4.2 | Kap 6, 13 Dod A |
Sec 2.4 |

C5 | Dec 9 | Numbers: Computations Complexity, RSA and Elgamal |
Hf 5 | Sti Ch 4, 5.1 | Kap 4, 5, 7, 9 | Sec 2.3, 14.2, Ch 3 |

W3 | Dec 9 | Streams and Numbers | Exercises | |||

C6 | Dec 11 | Signatures and Hashing | Hf 6 | Sti 6.2, 7 Sch 5.3 |
Kap 10, 11 | Sec 11.3, 9.2, 9.7.1 |

C7 | Dec 16 | Zero Knowledge Proofs | Hf 7 | Sch 21, 23.11 Sti 9 |
Ch 10 | |

W4 | Dec 16 | Cryptography with numbers |
Exam questions from Chapters 5 and 6 Explanation: Philips remote controls |
|||

T1 | Dec 18 | First Exam | Classes C1 through C6 | |||

C8 | Jan 6 | Secret Sharing | Hf 8 | DF89, Mic92, Cra 99 | Kap 12 | Sec 12.7 |

W5 | Jan 6 | Cryptography with numbers |
NIZKP of fairness in decryption Explanation: Blind signing/decryptions The Private Secret Store |
|||

C9 | Jan 8 | Secure Computing | Hf 13 | Sch 5.5, 23.14 | Kap 14 | Cra99 |

C10 | Jan 13 | Group Cryptografie | Hf 8 | DF89, Cra99 | ||

W6 | Jan 13 | Sharing, Computing |
Questions about Chapters 8 and 13 The project paper: LaTeX package First Exam |
|||

C11 | Jan 15 | Electronic Money | Hf 12 | |||

C12 | Jan 20 | Discrete Logarithms (more mathematical) |
Hf 14 | Sti 5.1, 5.2 Gar00 Chap 27 |
Kap 8 | Sec 3.6 |

W7 | Jan 20 | Proactivity, eMoney |
Questions about Chapters 8 and 12 Ask questions about project and paper Still have energy? More questions |
|||

C13 | Jan 22 | Pollard Rho | Summary of projects done by students
Questioning hour about exam material |
|||

T2 | Jan 27 | Second Exam | Classes C7 through C13 | |||

S | Jan 29 | Crypto Mini-Symposium | Student papers | |||

P | Jan 30 | Paper deadline |

The first part of the course (chapters 1 through 5 of the course book) concentrate on *confidentiality* by means of encrypting and decrypting information.
The second half of the course discusses various cryptographic techniques and protocols for authentication, integrity, and other protection tasks.

gerard@cs.uu.nl