Lecture Plan 2022
This is the preliminary outline for the lectures. There may be some adjustments.
Boldface means that it is fixed. Italic means that this is from last year and may be changed.
Date |
Location |
Lecture |
Content |
Chapter |
22-11-01 |
E:C |
L1 |
Introduction, Number Theory |
LN1.pdf
|
22-11-02 |
E: C |
L2 |
Abstract Algebra |
22-11-03 |
E: C |
L3 |
Finite Fields |
22-11-08 |
E:C |
L4 |
Finite fields, Project 1 |
|
22-11-09 |
E:C |
L5 |
Classical Crypto Systems |
LN2.pdf
|
22-11-10 |
E:C |
L6 |
Information Theory |
LN3.pdf |
|
|
|
|
|
|
|
|
|
22-11-15 |
E:C |
L7 |
Shannon's Theory of Secrecy |
|
22-11-16 |
E:C
|
L8 |
Shannon's Theory of Secrecy,
Stream Ciphers and Shift Registers
|
LN4a.pdf
|
22-11-17 |
E:C
|
L9
|
Shift Register Sequences, LFSRs and cycle sets, |
|
22-11-22 |
E:C |
L10 |
Statistical properties, Project 2, Massey's Algorithm, |
|
22-11-24 |
E: C |
L11 |
Attacks, Project 3, Actual Stream Ciphers |
LN4b.pdf
|
|
|
|
|
|
22-11-29 |
E: C |
L12 |
Block Ciphers, (Linear cryptanalysis), |
LN5.pdf
Chapter 2 in the book
https://link.springer.com/book/10.1007%2Fb136373
|
22-12-01 |
E: C |
L13 |
Public Key Crypto Systems, RSA, Prime Number Generation
|
LN6a.pdf |
22-12-06 |
E:C |
L14 |
Factoring, Key Exchange, Digital Signatures |
LN6b.pdf
|
22-12-07
|
E: C |
L15 |
Hash functions, + inspiration lecture
|
LN7.pdf
|
22-12-13 |
E: C
|
L16 |
Hash functions + Authentication |
|
22-12-14 |
E: C |
L17 |
Authentication + Secret Sharing |
LN8.pdf
|
22-12-15 |
E: C |
L18 |
Secret Sharing + END OF LECTURES
|
|
|