06 20008 Cryptography

Volker Sorge 10 credits in Semester 1

News

The Review Suggestions have been updated and some mistakes have been corrected in the handouts and solutions. Please see the Errata for details.

Some pictures from the Field Trip to Bletchley Park are here. If you have others, please contribute.

Field Trip to Bletchley Park, Wednesday 13th: We will leave at 10 am sharp(!) from the roundabout between University station and building 18. See part C on the campus map. We should be back before 6pm.

There will be an Exercise session on Tuesday 5th of December at 6pm in LR7, Arts (Building 32 on the Campus Map). Please have a look at the exercises so far and prepare questions.

There will be an Exercise session on Friday 10th of November at 5pm in LG32, Learning Centre. Please have a look at the exercises so far and prepare questions.

Please observe that we have another change of lecture theatre on Tuesday and have changed lecture time for Thursday. For details see below.

We had new lecture theatres assigned. For details see below.

Handout 1 has been reworked. The old handout 1 is obsolete (including Mathematics 1!). You can get the new handout in the lecture Thursday 5 Oct or download it below.

Lectures

The lectures are
Tuesdays, 12:00-1:00 in 112, Chemical Engineering (Building 10 on the Campus Map)
Thursdays 1:00-2:00 in LT1, Sport & Exercise Sciences (Building 8 on the Campus Map)

Questions

If you have any questions, problems, or comments, please email me or come and see me during my office hours Thursdays 2-3pm after the lecture. To see me outside these office hours, please email me and suggest some times, which are compatible with my timetable.

When emailing, please observe that you can expect the fastest response, when your email is short and in plain ASCII. If you have to send attachments, please make sure they are in some open standard format. In particular, do NOT send MS word files. Why? See here.

Recommended Books

Title Author(s) Publisher Comments
Practical Cryptography Fergueson, Schneier John Wiley & Sons Supplementary Reading
Applied Cryptography Schneier John Wiley & Sons Supplementary Reading
Handbook of Applied Cryptography Menezes, van Oorschot, Vanstone CRC Press Supplementary Reading
Cryptography Smart McGraw Hill Supplementary Reading
Beginning Cryptography with Java Hook John Wiley & Sons Book on Programming
Contemporary Cryptology Catalano, Cramer, Damgard, DiCrescenzo, Pointcheval, Takagi Springer Verlag Advanced Material

Handouts and Worksheets

It is planned to make the handouts for the lectures available on-line after they have been handed out in the lectures. Please DO NOT PRINT THEM OUT. First check for spare and reference copies which can be found in the School's library. DO NOT WASTE PRINTER RESOURCES.

Week Topic Handout Solution
0 General Information gzipped PostScript, pdf  
1 Historical Ciphers gzipped PostScript, pdf gzipped PostScript, pdf
2 Block Ciphers: Feistel Ciphers, DES gzipped PostScript, pdf gzipped PostScript, pdf
3 Modes of Operations, Cryptomeria gzipped PostScript, pdf gzipped PostScript, pdf
4 AES (Rijndael), Finite Fields gzipped PostScript, pdf gzipped PostScript, pdf
5 Stream Ciphers: RC4, LFSR, CSS, A5/1 gzipped PostScript, pdf gzipped PostScript, pdf
6 Key Exchange Protocols, Overview of Cryptanalysis techniques gzipped PostScript, pdf  
7 Cryptographic Hash Functions and Message Authetication Codes gzipped PostScript, pdf gzipped PostScript, pdf
8 Public Key Cryptography, Discrete Logarithms gzipped PostScript, pdf gzipped PostScript, pdf
9 RSA, Generating Prime Numbers, Arithmetic Modulo Composites gzipped PostScript, pdf
gzipped PostScript, pdf
10 Digital Signatures gzipped PostScript, pdf  
11 Certificates, Commitment Schemes, Zero Knowledge Proofs gzipped PostScript, pdf gzipped PostScript, pdf
12 Review Suggestions gzipped PostScript, pdf  
QC Quantum Cryptography
Guest Lecture by Iain Styles
pdf  
Glossary The complete Cryptography glossary gzipped PostScript, pdf  
13 Mock Exam gzipped PostScript, pdf  

Errata can be found here.


Maintained by: Volker Sorge, School of Computer Science, The University of Birmingham
Last modified: Tue Jan 5 21:36:02 GMT 2006