All information about lectures will appear here.
Zoom meeting:
TOPIC: EDIN01 Cryptology, lectures
WHEN: See schedule
WHERE: LU Zoom meeting: https://lu-se.zoom.us/j/61893272898
Please prepare ahead of time:
If you are a student or an employee at Lund university, use your LUCAT-credentials to login at https://lu-se.zoom.us and activate your account. Also make sure you have logged in with your LUCAT-credentials (SSO) in the Zoom app. Download or update the Zoom app to ensure full functionality in the meeting.
If you have any problems logging in, please contact the LU Servicedesk at servicedesk@lu.se
Time schedule: (Study week 1-6), lectures in ZOOM
|
|
Lecture Plan 2020
This is the preliminary outline for the lectures. There may be some adjustments.
Boldface means that it is fixed. Italic means that this is from last year and may be changed.
Date |
Location |
Lecture |
Content |
Chapter |
20-11-03 |
ZOOM |
L1 |
Introduction, Number Theory |
LN1.pdf
slides1.pdf
slides1to3.pdf
|
20-11-04 |
|
L2 |
Abstract Algebra |
20-11-05 |
|
L3 |
Finite Fields |
20-11-10 |
|
L4 |
Finite fields, Project 1 |
slides4.pdf
|
20-11-11 |
|
L5 |
Classical Crypto Systems |
LN2.pdf
slides5.pdf
|
20-11-12 |
|
L6 |
Information Theory |
LN3.pdf |
|
|
|
|
|
|
|
|
|
20-11-17 |
|
L7 |
Shannon's Theory of Secrecy |
slides6to7.pdf
|
20-11-18 |
|
L8 |
Shannon's Theory of Secrecy,
Stream Ciphers and Shift Registers
|
exampleL8.pdf
LN4a.pdf
slides8to9.pdf
|
20-11-19 |
|
L9
|
Shift Register Sequences |
|
20-11-24 |
|
L10 |
LFSRs and cycle sets, Project 2 |
|
20-11-25 |
|
L11 |
Attacks, Massey's Algorithm, Project 3, Actual Stream Ciphers |
slides10to11.pdf
LN4b.pdf |
|
|
|
|
Actual_stream_ciphers.pdf
|
20-11-26 |
|
L12 |
Block Ciphers, (Linear cryptanalysis), |
LN5.pdf
Chapter 2 in the book
https://link.springer.com/book/10.1007%2Fb136373
slides12.pdf
|
20-12-01 |
|
L13 |
Public Key Crypto Systems, RSA, |
LN6a.pdf
slides13to14.pdf
|
20-12-02 |
|
L14 |
Prime Number Generation, Factoring, Key Exchange, |
LN6b.pdf
slides14b.pdf
|
20-12-08
|
|
L15 |
Digital Signatures, Hash functions, Authentication |
LN7.pdf
slides15.pdf
|
20-12-09 |
|
L16 |
Authentication + inspiration lecture |
inspiration.pdf (not part of the course contents)
|
20-12-15 |
|
L17 |
Secret Sharing |
LN8.pdf
slides16to17.pdf
|
20-12-16 |
|
L18 |
Secret Sharing, (END OF LECTURES) |
endofcourse.pdf (this is not updated!)
|
|
 |
|