Cryptography

Overview of lectures (2008/9)

No Date Subject CBDM SSS ZK HAC
C1 Nov 25 Introduction, Attacks, Unicity Hf 1 Sti Ch 1, Ch 2 Kap 1, 2 Sec 1.2, 1.4, 1.5, 1.13, 7.3.
W1 Nov 25 Elgamal workshop, projects  
C2 Nov 27 Data Encryption Standard Hf 2 Sti Ch 3 Kap 3 Sec 7.4, Hel80
C3 Dec 2 Stream Ciphers Hf 3 Sti 3.5, Sch 15.1, 8.4, BSW00   Sec 6.1, 6.2, 6.3, BSW00
W2 Dec 2 Symmetric Encryption Exercises
C4 Dec 4 Numbers: properties Hf 4 Sti 4.2 Kap 6, 13
Dod A
Sec 2.4
C5 Dec 9 Numbers: Computations
Complexity, RSA and Elgamal
Hf 5 Sti Ch 4, 5.1 Kap 4, 5, 7, 9 Sec 2.3, 14.2, Ch 3
W3 Dec 9 Streams and Numbers Exercises
C6 Dec 11 Signatures and Hashing Hf 6 Sti 6.2, 7
Sch 5.3
Kap 10, 11 Sec 11.3, 9.2, 9.7.1
C7 Dec 16 Zero Knowledge Proofs Hf 7 Sch 21, 23.11
Sti 9
  Ch 10
W4 Dec 16 Cryptography with numbers Exam questions from Chapters 5 and 6
Explanation: Philips remote controls
T1 Dec 18 First Exam Classes C1 through C6
C8 Jan 6 Secret Sharing Hf 8 DF89, Mic92, Cra 99 Kap 12 Sec 12.7
W5 Jan 6 Cryptography with numbers NIZKP of fairness in decryption
Explanation: Blind signing/decryptions
The Private Secret Store
C9 Jan 8 Secure Computing Hf 13 Sch 5.5, 23.14 Kap 14 Cra99
C10 Jan 13 Group Cryptografie Hf 8     DF89, Cra99
W6 Jan 13 Sharing, Computing Questions about Chapters 8 and 13
The project paper: LaTeX package
First Exam
C11 Jan 15 Electronic Money Hf 12      
C12 Jan 20 Discrete Logarithms
(more mathematical)
Hf 14 Sti 5.1, 5.2
Gar00 Chap 27
Kap 8 Sec 3.6
W7 Jan 20 Proactivity, eMoney Questions about Chapters 8 and 12
Ask questions about project and paper
Still have energy? More questions
C13 Jan 22 Pollard Rho Summary of projects done by students
Questioning hour about exam material
T2 Jan 27 Second Exam Classes C7 through C13
S Jan 29 Crypto Mini-Symposium Student papers
P Jan 30 Paper deadline

The first part of the course (chapters 1 through 5 of the course book) concentrate on confidentiality by means of encrypting and decrypting information. The second half of the course discusses various cryptographic techniques and protocols for authentication, integrity, and other protection tasks.



[top] [education] [info] [index]
gerard@cs.uu.nl