2006–02–09 To. 10-12 Q31 vecka 7 F10 2006–02–14 Ti. 13-15 D35. F11 2006–
02–16 To. 10-12 D32 vecka 8 F12 2006–02–21 Ti. 13-15 E33. F13 ...
25 januari 2006
Datavetenskap och kommunikation Johan Håstad
2D1449, Foundations of Cryptography, 2006 Goal
F6-F8: Asymmetric cryptography, RSA, El-Gamal, McEliece.
The goal of the course is to • give a good overview of modern cryptography
F9: Hash-functions, theory and practice, SHA-1, MAC,
in order that students should • know how to evaluate and, to some extent, create cryptographic constructions.
F10-F11: Digital signatures, key distribution, identification. F12: Elliptic curves.
Prerequisites
Corresponding to one of the courses 2D1352 Algo- F13: Pseudorandom generators. rithms, data structures and complexity or 2D1354 Algorithms and complexity. Knowledge of probability theory, mathematics and theory of algorithms corresponding F14-15: Digital money, guest lecture by Mats Näslund, Ericsson. to the required courses of the KTH educations D or F.
Professor
Course material
Johan Håstad is responsible for the course and also the principal lecturer. The safest way to reach him is by The lectures cover essentially all the course material. email at , but he can also sometimes As a main text for the course we recommend Stinson: (usually?) be found in his office 1435 at Nada. “Cryptography, Theory and Practice”, Chapman & Hall /CRC, 2nd edition. Another possibility that contains the material of the Schedule course is Trappe, Washington: “Introduction to Cryptovecka 3 F1 2006–01–18 On 13-15 D35 graphy, with coding theory”, Pearson International. F2 2006–01–19 To 10-12 D35 For the student interested in more details and depth F3 2006–01–20 Fr 8-10 D35 about the theoretical foundations of cryptography we revecka 4 F4 2006–01–24 Ti 13-15 D35 commend Goldreich: “Foundations of Cryptography”, F5 2006–01–26 To 13-15 D33 Cambridge University Press. vecka 5 F6 2006–01–31 Ti 13-15 D35 vecka 6 vecka 7
F7 F8 F9 F10 F11 F12 F13 F14 F15
2006–02–02 2006–02–07 2006–02–09 2006–02–14 2006–02–16 2006–02–21 2006–02–23 2006–02–27 2006–03–02
To Ti To Ti To Ti To Må To
10-12 13-15 10-12 13-15 10-12 13-15 10-12 13-15 10-12
Q31 D35 Q31 D35 D32 E33 D35 E33 E33
To register and check in
Many categories of students are welcome to this course and different students might face different administrative problems. We encourage each student to make sure vecka 9 that he/she does not have any problems. You must also do the following commands from a Unix computer at Nada. Do »res checkin krypto06» Originally only 13 lectures were scheduled and the to make sure that your score can be reported and also last two lectures were added at the first lecture as agreed »course join krypto06» which among other effects mawith the class. kes sure that messages intended for all course particiA preliminary plan of the lectures is as follows. pants reach you each time you log in. When the course is over you can give the command »course leave krypF1-F2: Introduction, classical cryptography, security, to06» to return to your initial configuration. entropy. Log-in messages and the course homepage are imF3-F5: DES and AES. Attacks, linear cryptanalysis, ti- portant and vital information for the course might be given only through these channels. ming and power attacks. vecka 8
Examination
The grade determined by the score on the homework is final and the deadlines for handing in the solutions are normally not negotiable. Note that late solutions are accepted with some penalties described in the rules for the homeworks. Some circumstances such as severe illnesses can, however, be taken as an excuse for late homework, while lack of time due to work outside the university or many parallel courses are not considered as legitimate reason for a change of this policy. If you feel you have a good reason to hand in homework late, please contact the lecturer as soon as possible.
There is no final exam. The course is graded through three sets of homework problems. Written solutions are supposed to be handed in and then discussed orally. A first approximation of the deadlines for handing in solutions to the problems sets are, 9/2, 23/2, and 16/3, respectively. The Nada Code of Honor applies to these homework problems but there are also some rules specific to this course. These rules are available electronically from the course home page. Scoring at least 30 points on each of the three sets guarantees a passing grade. If, apart from this require- Important source of information ment, the total is 140 or more the grade 4 is assured and total scores above 190 are awarded the grade 5. For stu- Important information about the course will continudents at SU the requirements for passing the course is ously be published at the course homepage, .