Lecture plan

This plan will change through the semester.

Chapter numbers refer to Stinson, except where marked. HAC is the Handbook of Applied Cryptography.

WeekTopicKey wordsChaptersExercise
34How to agree on and use a secretDiffie-Hellman, classical ciphers, perfect security11.2, 1.1, 1.2, 2.3
35 Classical ciphers, simple cryptanalysis, modern block ciphers, stream ciphers1.1, 1.2, 3.1, 3.2, 3.6, HAC 4.5
36 Modern ciphers, integrity3.7, 4.4, 4.5
37How to break DHPohlig-Hellman.6.2
38 Baby-step-Giant-step, Pollard's rho. Finite fields, index calculus.6.2, 6.3
39 Primality testing.5.4
40 Elliptic curves6.5
41 Elliptic curves6.5
42Public key encryptionElGamal/RSA5.1, 6.1, 6.7, 5.3
43 RSA, Pollard's rho and p-1, Index calculus for factoring5.5-5.9
44Hash functionsCollisions, preimages, second preimages, iterated hash functions4.1-4.3 
45Digital signaturesRSA7.1-7.2, 7.5.2
46 Schnorr signatures and zero knowledge.7.4.1
47Summary
2009-11-11, Kristian Gjøsteen