bild
Skolan för
datavetenskap
och kommunikation
KTH / CSC / Kurser / 2D1449 / krypto07

Foundation of cryptography

Course information

News

The course evaluation by students and a course analyis by Johan Håstad (in Swedish).

Lecturer

Johan Håstad is responsible for all aspects of this course. Per Austrin will help in correcting the homework assignments, and there might be some guest lecture. The language of the lectures will be decided at the beginning of the course but in any case all written material connected to the course will be in English.

Checking in

When time comes. Log unto a unix computer at CSC and give the following two commands

res checkin krypto07
course join krypto07

If you do not do this your results cannot be reported and you will miss vital information related to the course.

Handouts

The slides used by Mats Näslund.

Description of lectures in the past and future together with pointers to Stinson, edition 3.

A decription of the G-writer.

Course memo.

Homework

homework 2, input files: q1 q2

First homework, input files: gskriv gskriv2 unknown

There will be two tradtional sets of homeworks, they will be due on February 14 and March 7 and available at least three weeks prior to these dates.

An new and essential part of the course is to make a presentation of a research paper in cryptography. To get a passing grade on the course such a presentation is required.

There is a more detailed description of both these tasks in the rules for the homeworks. If you need further information contact JohanHåstad.

As the presentation is a new component of the course consider the rules given as a first attempt to formalize this task and we are open to a discussion to find an optimal format.

The homework sets are supposed to be challenging, and even getting a passing grade (the grade 3) will require some effort. Keep in mind however that you do not have to solve all the problems even to get a good grade. The idea is that it is better to solve some of the problems well than to solve all the problems partially, and solutions will be graded with this in mind.

Please note the rules that apply to the homework. Be sure to read both the homework rules and the code of honors before you start working on the problems!

Course book

We recommend Stinson: Cryptography, Theory and Practice, Chapman & Hall /CRC, 2nd edition. Another possibility that contains the material of the course is: Trappe, Washington "Introduction to Cryptography, with coding theory", Pearson International.

For the student interested in more details and depth about the theoretical foundations of cryptography we recommend Foundations of Cryptography by Oded Goldreich.

As this years lectures will not be very different from last years lecture one alternative is to look at last years lecture notes available from last years home page home page

Schedule

 F ti 15-17 v 4-8   D32 
 F ti 15-17 v 9   D3 
 F on 8-10 v 4-6,8-9   D32 
 F on 8-10 v 7   D33 
 F fr 15-17 v 4-6   D32 

Links

  • NIST's page with FIPS documents includes links to the specifications of
    Trippel-DES (FIPS 46-3)
    AES (FIPS 197)
    SHA-1 (FIPS 180-1)
    DSS (FIPS 186-2)
  • IACR is an organization for cryptographic research.
  • Simon Singh's cipher challenge was won by a Swedish team in 2000.
Copyright © Sidansvarig: Johan Håstad <johanh@kth.se>
Uppdaterad 2008-01-04