Selected Topics in Cryptology
2014-2015 - IMT6041 - 5 ECTS

On the basis of

  •  IMT4532 Cryptology 1, IMT4552 Cryptology 2, or equivalent

Expected learning outcomes

Knowledge

  • The candidate possesses knowledge at the most advanced frontier in the field of cryptology. The candidate has mastered academic theory and scientific methods in cryptology.
  • The candidate is capable of considering suitability and use of different methods and processes in research in the field of cryptology.
  • The candidate is capable of contributing to development of new knowledge, theories, methods, interpretations and forms of documentation in cryptology.

Skills

  • The candidate is capable of formulating problems, planning and completing research projects in cryptology.
  • The candidate is capable of doing research and development at a high international level.
  • The candidate is capable of handling complex academic tasks. The candidate can challenge established knowledge and practice in cryptology.

General competence

  • The candidate is capable of identifying relevant – and possibly new - ethical problems and exercising research in cryptology with academic integrity.
  • The candidate is capable of managing complex interdisciplinary tasks and projects.
  • The candidate is capable of disseminating the results of research and development in cryptology through approved national and international publication channels.
  • The candidate is capable of taking part in debates in international forums within the field of cryptology.
  • The candidate is capable of considering the need for, taking initiative to and engaging in innovation in the field of cryptology.

Topic(s)

1. Introduction – elements of information theory, symmetric and asymmetric cipher theory

2. Elements of modern symmetric cipher theory

3. Modern public key systems

Teaching Methods

Lectures
Exercises
Project work

Form(s) of Assessment

Oral exam, individually
Evaluation of Project(s)

Form(s) of Assessment (additional text)

  • Oral exam
  • Project evaluation of one project
  • Both parts must be passed.

Grading Scale

Pass/Failure

External/internal examiner

Project: one internal examiner. Every 4th year, an external examiner is used, next time in 2016.

Oral exam: two internal examiners. Every 4th year, an external examiner is used, next time in 2017.

Re-sit examination

The whole course must be repeated

Examination support

  • Calculator
  • Dictionary

Coursework Requirements

None.

Teaching Materials

Books:

1. Introduction to Cryptography and Coding Theory, 2. edition, Trappe W., Washington L., Prentice Hall, 2006, ISBN: 0131981994.

2. Handbook of Applied Cryptography, Menezes A., http://www.cacr.math.uwaterloo.ca/hac

Various papers (available on-line)

Additional information

There is room for 50 students for the course.