Date |
Location |
Lecture |
Content |
Chapter |
19-11-05 |
E:C |
L1 |
Introduction, Number Theory |
LN1.pdf
slides1.pdf
slides1to3.pdf
|
19-11-06 |
E:2311 |
L2 |
Abstract Algebra |
19-11-07 |
E:1409 |
L3 |
Finite Fields |
|
|
|
Finite fields, Project 1 |
slides4.pdf
|
19-11-12 |
|
|
CANCELLED! |
|
19-11-13 |
|
|
CANCELLED! |
|
19-11-14 |
E:1406 |
L5 |
Classical Crypto Systems |
LN2.pdf
slides5.pdf
LN3.pdf
|
19-11-19 |
E:C |
L6 |
Information Theory |
19-11-20 |
E:2311 |
L7 |
Shannon's Theory of Secrecy |
slides6to7.pdf
|
19-11-21 |
E:1409 |
L8 |
Shannon's Theory of Secrecy,
Stream Ciphers and Shift Registers
|
LN4a.pdf
slides8to9.pdf
|
19-11-26 |
E:C
|
L9
|
Shift Register Sequences |
|
19-11-27 |
E:2311 |
L10 |
LFSRs and cycle sets, Project 2 |
|
19-11-28 |
E:1409 |
L11 |
Attacks, Massey's Algorithm, Project 3, Actual Stream Ciphers |
slides10to11.pdf
LN4b.pdf |
|
|
|
|
Actual_stream_ciphers.pdf
|
19-12-03 |
E:C |
L12 |
Block Ciphers, (Linear cryptanalysis), |
LN5.pdf
Chapter 2 in the book
https://link.springer.com/book/10.1007%2Fb136373
slides12.pdf
|
19-12-04 |
E:2311 |
L13 |
Public Key Crypto Systems, RSA, |
LN6a.pdf
slides13to14.pdf
|
19-12-05 |
E:1409 |
L14 |
Prime Number Generation, Factoring, Key Exchange, |
LN6b.pdf
slides14b.pdf
|
19-12-11
|
E:2311 |
L15 |
Digital Signatures, Hash functions, Authentication |
LN7.pdf
slides15.pdf
|
19-12-12 |
E:1409 |
L16 |
Authentication + guest lecture |
|
19-12-17 |
E:C |
L17 |
Secret Sharing |
LN8.pdf
slides16to17.pdf
|
18-12-18 |
E:2311 |
L18 |
Secret Sharing, (END OF LECTURES) |
endofcourse.pdf
|