|Volker Sorge||10 credits in Semester 1|
The walk-through for Programming Exercise 2 is available.
Exercise sheet 8 is due on Friday, 27 November, 11am, with the exception of exercise 26 that is due Friday, 4 December.
Programming Exercise 1 has been extended until Monday, 16 November, 12pm.
Updated solutions to exercise sheet 2 are available, including the missing decryption part.
There is an animiation of DES available online. Please have a look at the tutorial implementation of DES. Please also fill in the evaluation questionnaire that can be found at online. Please return the questionnaire by email to firstname.lastname@example.org.
The hand-in deadline for exercise sheet 1 is Friday, 9 October, 11am.
The lectures are
Tuesdays, 2:00pm-3:00pm in LTC, Watson (Building R15 on the Campus Map)
Fridays 11:00am-12:00pm in LT1, Gisbert Kapp (Building G8 on the Campus Map)
Fridays 2:00pm-3:00pm in LT3, Sport & Exercise Science (Building Y14 on the Campus Map)
80% of your course mark will be determined by a 1.5-hour examination in May (or early June).
20% of the mark is determined by continuous assessment. See Handout 0 for details.
For continuous assessment exercises marked so far please see here
If you have any questions, problems, or comments, please email me or come and see me during my office hours Tuesdays 3-4pm. To see me outside these office hours, please email me and suggest some times, which are compatible with my timetable.
When emailing, please observe that you can expect the fastest response, when your email is short and in plain ASCII. If you have to send attachments, please make sure they are in some open standard format. In particular, do NOT send MS word files. Why? See here.
|Practical Cryptography||Fergueson, Schneier||John Wiley & Sons||Supplementary Reading|
|Applied Cryptography||Schneier||John Wiley & Sons||Supplementary Reading|
|Handbook of Applied Cryptography||Menezes, van Oorschot, Vanstone||CRC Press||Supplementary Reading|
|Cryptography||Smart||McGraw Hill||Supplementary Reading|
|Beginning Cryptography with Java||Hook||John Wiley & Sons||Book on Programming|
|Contemporary Cryptology||Catalano, Cramer, Damgard, DiCrescenzo, Pointcheval, Takagi||Springer Verlag||Advanced Material|
|0||General Information||gzipped PostScript, pdf|
|1||Historical Ciphers||gzipped PostScript, pdf||gzipped PostScript, pdf|
|2||Block Ciphers: Feistel Ciphers, DES||gzipped PostScript, pdf||gzipped PostScript, pdf|
|3||AES (Rijndael), Finite Fields||gzipped PostScript, pdf||gzipped PostScript, pdf|
|4||Modes of Operations, Cryptomeria||gzipped PostScript, pdf||gzipped PostScript, pdf|
|5||Stream Ciphers: RC4, LFSR, CSS, A5/1||gzipped PostScript, pdf||gzipped PostScript, pdf|
|6||Cryptographic Hash Functions
Message Authetication Codes
|gzipped PostScript, pdf||gzipped PostScript, pdf|
|7||Key Exchange Protocols
Overview of Cryptanalysis techniques
|gzipped PostScript, pdf|
|8||Public Key Cryptography, Discrete Logarithms||gzipped PostScript, pdf||gzipped PostScript, pdf|
|9||RSA, Generating Prime Numbers, Arithmetic Modulo Composites||gzipped PostScript,
||gzipped PostScript, pdf|
|10||Digital Signatures||gzipped PostScript, pdf||gzipped PostScript, pdf|
|11/1||Certificates, Commitment Schemes, Zero Knowledge Proofs||gzipped PostScript, pdf||gzipped PostScript, pdf|
Guest Lecture by Iain Styles
|12||Review Suggestions||gzipped PostScript, pdf|
Errata can be found here.
Implement the exercises in a programming language of your choice.
The only requirement is that the program should be runnable on the Linux machines in the department.
Include sufficient explicit output into your program so I can convince myself that the computation actually
Submit the source of your program (with an included comment how to run it and your Student ID number) via Moodle. You can also include a Readme file with that information.
Also submit a file with the requested answers (i.e. only the answers to the problems, not the full intermediate output!) together with your code.
Programming exercises will be given on the exercise sheets
|1||Rijndael-like Cipher||In Handout 4 (ps.gz, pdf)||Examples and walk-through (pdf)
Test data (ASCII)
|Solutions||2||SHA-like Hash Function||In Handout 7 (ps.gz, pdf)||Examples and walk-through (pdf)
Test data (ASCII)
School of Computer Science,
The University of Birmingham
Last modified: Tue Feb 16 19:15:17 GMT 2010