Lecture plan (final)
Chapters are from the book Introduction to Cryptography with Coding Theory.
Week | Topic | Key words | Chapters |
---|---|---|---|
34 | Course overview - Introduction of main concepts - Classical monoalphabetic ciphers - Modular arithmetic | Confidentiality, Shift, Substitution & Affine ciphers, Congruences. | 1, 2.1–2.2, 2.4, 3.1.1, 3.3. |
35 | Classical mono- & poly-alphabetic ciphers - Number theory | Affine & Vigenère ciphers, GCD, Euclidean algorithm, Linear congruence equations, Inverses. | 2.2–2.3, 2.9, 3.1.3, 3.2–3.3. |
36 | Classical polyalphabetic & polygraphic (block) ciphers | Vigenère cipher, One time pad & Hill cipher. | 2.3, 2.7, 2.9. |
37 | Stream & Block ciphers | Feedback shift registers, (AES), Confusion & Diffusion. | 2.7, 2.11, (5). |
38 | Block ciphers - How to agree on a secret - Modular arithmetic | (AES), Modes of operation, Multiple encryptions, Modular exponentiation, Primitive roots, DH-KAP | 3.5–3.7, 4.5, 4.7, (5), 7.4. |
39 | Analysis of DH-KAP - Number Theory | Primality testing: Fermat & Miller-Rabin, DLog: Baby-step-Giant-step, Pohlig-Hellman, Chinese Remainder Theorem. | 3.1.2, 3.4, 6.3, 7.1–7.2. |
40 | Analysis of DH-KAP (ctd.) - Public Key Cryptography | DLog: Pohlig-Hellman & Index Calculus, Euler's \(\phi\)-function, RSA & attacks. | 3.6, 6.1-6.2, 7.2. |
41 | Public Key Cryptography (ctd.) | RSA & attacks, Factoring: Fermat, Pollard's \(p-1\) & Random Squares, Semantic Security. | 6.1, 6.2.2, 6.4, 7.5. |
42 | Public Key Cryptography (ctd.) - Digital signatures | Semantic Security, ElGamal, RSA signatures. | 6.4, 7.5, 9.1, 9.3. |
43 | Digital signatures (ctd.) - Cryptographic hash functions | ElGamal signatures, Pre-images, second pre-images, collisions, DH-KAP authentication. | 8.1, 8.4, 9.2, 10.1. |
44 | Message authentication codes - Cryptographic applications | CBC-MAC, (HMAC), Secret sharing, Blind signatures & (Digital cash). | (11)–12. |
45 | Cryptographic applications (ctd.) | RSA Blind signature, Mental coin flipping & card games, Square roots, Quadratic Residues, (Password based authentication). | 3.9, 3.10 on page 88 only, 9.1, 13. |
46 | Recap | ||
47 | Recap | ||
48 | Exam | All of the above (not in brackets). |