Lecture plan

This plan will change through the semester.

Chapter numbers refer to Stinson, except where marked. HAC is the Handbook of Applied Cryptography.

WeekTopicKey wordsChapters
34How to agree on a secret and what to do with itDiffie-Hellman. Classical ciphers, confidentiality, perfect security11.2, 1.1, 1.2, 2.3
35 Classical ciphers, modern ciphers1.1, 1.2, 3.1, 3.2, 3.6
36How to break DHIntegrity, message authentication codes. Finite cyclic groups. Discrete logarithms.4.4, 4.5, HAC 4.5, 6.2
37 Pohlig-Hellman. Primality testing. Baby-step-Giant-step.5.4, 6.2
38 Pollard's rho. Generic groups. Finite fields, index calculus.6.2, 6.3, 6.4
39 Elliptic curves6.5
40PKCElliptic curves, Public key encryption, ElGamal6.5, 6.1, 6.7.2
41 Public key encryption, RSA, factoring.5.1, 5.3, 5.5
42 RSA, Pollard's rho and p-1, Index calculus for factoring5.5-5.6, 5.7.1-2
43Hash functionsCollisions, preimages, second preimages, iterated hash functions4.1-4.3
44Digital signaturesRSA. Schnorr signatures and zero knowledge.7.1-7.2, 7.4.1, 7.5.2
45Password based cryptography
46Password based cryptography
47Summary
2012-10-03, Kristian Gjøsteen