Lecture plan

This plan will change through the semester.

Chapter numbers refer to Stinson, except where marked. HAC is the Handbook of Applied Cryptography. NTA is A computational Introduction to Number Theory and Algebra.

WeekTopicKey wordsChapters
34How to agree on a secret and what to do with itDiffie-Hellman. Classical ciphers, confidentiality, perfect security11.2, 1.1, 1.2, 2.3
35 Classical ciphers, modern ciphers1.1, 1.2, 3.1, 3.2, 3.6 3.7
36How to break DHIntegrity, message authentication codes. Finite cyclic groups. Discrete logarithms.4.4, 4.4.2, 4.5, HAC 4.5, 6.2
37 Pohlig-Hellman. Primality testing.5.4, 6.2
38 Primality testing. Baby-step-Giant-step. Pollard's rho.5.4, 6.2.1-3
39 Generic groups. Finite fields, index calculus. Elliptic curves.6.2.4, 6.3, 6.4, 6.5 (only point compression in 6.5.4).
40PKCElliptic curves6.5 (only point compression in 6.5.4)., 6.1
41 Public key encryption, ElGamal, RSA, factoring.6.1, 6.7.2, 5.1, 5.3, 5.5
42 RSA, Pollard's rho and p-1, Index calculus for factoring5.5-5.6, 5.7.1-2
43Hash functionsCollisions, preimages, second preimages, iterated hash functions4.1-4.3, 4.4
44Digital signaturesRSA. Schnorr signatures and zero knowledge.7.1-7.2, 7.4.1, 7.5.2
45Random numbers Partially covered by NTA Ch. 6
46Random numbers, summary
47Old exams
2013-11-08, Kristian Gjøsteen