Modern Cryptology
2015-2016
-
IMT6081
- 5 ECTS
Expected learning outcomes
Knowledge
- The candidate possesses knowledge at the most advanced frontier in the field of cryptology. The candidate has mastered academic theory and scientific methods in cryptology.
- The candidate is capable of considering suitability and use of different methods and processes in research in the field of cryptology.
- The candidate is capable of contributing to development of new knowledge, theories, methods, interpretations and forms of documentation in cryptology.
Skills
- The candidate is capable of formulating problems, planning and completing research projects in cryptology.
- The candidate is capable of doing research and development at a high international level.
- The candidate is capable of handling complex academic tasks. The candidate can challenge established knowledge and practice in cryptology.
General competence
- The candidate is capable of identifying relevant – and possibly new - ethical problems and exercising research in cryptology with academic integrity.
- The candidate is capable of managing complex interdisciplinary tasks and projects.
- The candidate is capable of disseminating the results of research and development in cryptology through approved national and international publication channels.
- The candidate is capable of taking part in debates in international forums within the field of cryptology.
- The candidate is capable of considering the need for, taking initiative to and engaging in innovation in the field of cryptology.
Topic(s)
- Introduction – elements of information theory, general cipher system theory
- Contemporary theory of randomness – randomness and indistinguishability
- Elements of modern symmetric ciphers theory – Galois fields, primitive polynomials, Boolean functions theory, block ciphers theory, hash functions theory
- Public key cryptography – RSA theory, digital signatures
Teaching Methods
Lectures
Exercises
Project work
Form(s) of Assessment
Oral exam, individually
Evaluation of Project(s)
Form(s) of Assessment (additional text)
- Oral exam
- Project evaluation of one project
- Both parts must be passed.
Grading Scale
Pass/Failure
External/internal examiner
Project: one internal examiner. Every 4th year, an external examiner is used, next time in 2016.
Oral exam: two internal examiners. Every 4th year, an external examiner is used, next time in 2017.
Re-sit examination
The whole course must be repeated.
Examination support
Calculator, dictionary
Coursework Requirements
None
Teaching Materials
Books:
1. Introduction to Cryptography and Coding Theory, 2. edition, Trappe W., Washington L., Prentice Hall, 2006, ISBN: 0131981994.
2. Handbook of Applied Cryptography, Menezes A., http://www.cacr.math.uwaterloo.ca/hac
3. Introduction to modern cryptography, Katz J., Lindell Y., Chapman&Hall/CRC, 2008, ISBN: 1-58488-551-3
Various papers (available on-line)
Additional information
There is room for 50 students for the course.