Results of the repair exam (18/03/2008): Five students have enrolled in the repair exam this morning, and as a result, three more students have passed the Cryptography course; see the list of grades. Question 2b asked to argue that 2DES will be safe for a few decades to come. Most students did a back of the envelope calculation, based on today's technology, arriving at safety for several eons to come. An argument taking technological developments into account goes like this. The first public demonstration of a DES cracker was in 1998. By Moore's law, computing power doubles every one and a half year, and cracking 2DES is 256 times more work. Thus, 2DES can probably be cracked around 84 years later, in 2082.
Repairing your results (19/02/2008): Out of 33 enrolled students, 9 have not completed the course. Twenty students have received a pass mark and four a fail mark. The four candidates who have failed the course, should take the repeated exam on March 18, possibly in combination with a revision of their paper. Students who have passed, but want to improve their grade are allowed to participate in this exam. If you want to have a better paper in the course proceedings Cryptography in Context, you can get the commented paper from me, and send me an updated file. For most of the papers, this should not take more than one or several hours.
Grading completed (19/02/2008): You can go to the list of grades to see your presentation mark. If you are interested, you can come to my office (CGN A308) to obtain your reviews for the talk, as well as the paper with teacher feedback.
Grading of presentations (31/02/2008): You can go to the list of grades to see your presentation mark.
Graphics in paper (30/01/2008): I decided to use pdfLaTeX to process the paper collection. This means that you can include jpg, pdf, or png formatted illustrations. Send them to me in the format in which you include them, and no further conversions will be needed by me.
Exam results (30/01/2008): Please go to the list of grades to check your result for the exam of January 29.
Symposium Cryptography in Context (18/01/2008): Please check the program for our Symposium on January 31.
Symposium Electronic Voting (11/01/2008): On Monday, January 21, a meeting will be held at the Radboud University in Nijmegen about Electronic Voting. It starts with the PhD defense of Wolter Pieters
Exam results (21/12/2007): Unfortunately the results of the exam are quite bad. Here is the exam, here is the solution suggestion, and here is the list of grades.
Class on December 13! (12/12/2007): Please be aware that on Thursday December 13, there will be regular class meeting! You are welcom at 13.15 in BBL426.
Project: Biometric Identity checks (28/11/2007): An additional project: what are the safety properties of the Austrian model for registration numbers? Can we do a similar thing with biometry? See model description and 2007 trend report on biometry.
Research Projects at TNO (28/11/2007): If you are interested in doing your Master project in security or cryptography, you may get inspired by the following projects at TNO:
Start of the course (15/10/2007):
Because of absense of the teacher, the Cryptography classes do not start in the first week of term 2.
Instead, the first class will be on Tuesday, November 27.
Bring your TI83 calculator! In the first class, we shall run a cryptography demonstration based on a program written for hand calculators of type Texas Instruments TI83 or TI84. Don't spend any money for it, but if you happen to have a TI83/84, please bring it to class.
Course reading and literature (15/10/2007): The principle course material is the book Cryptografie: Beveiliging van de Digitale Maatschappij, available here as full dowload and also obtainable from the student service desk. As the book is only available in Dutch, alternative reading material will be provided (from open internet sources) in English and Slovak.
General information (15/10/2007): Cryptography is all about the logical protection of data. This includes confidentiality of data sent over an open channel, access control, electronic money and banking, and e-voting, subjects that are all covered in this course.
The Cryptography course is part of the MSc Programme Applied Computing Science, but is also open to students in other programmes. The size of the course is 7.5 ects. The teacher of the course (starting November 2007) is dr Gerard Tel.