bild
Skolan för
elektroteknik
och datavetenskap

Foundation of Cryptography

Course information

News

The course is over. The grades have been set (on April 20) and should appear soon.

If you wish you can pick up your homework solutions in Johan Håstad's office in room 1435. If he is not there you find them in an alphabetically ordered pile on the table.

There is now a course analysis (in Swedish) partly based on the course evaluation.

Description of what happened at lectures.

Lecturer

Johan Håstad is responsible for most aspects of this course. Douglas Wikström will help in correcting the homework assignments, and there might be some guest lecture. The language of the lectures will be decided at the beginning of the course but in any case all written material connected to the course will be in English.

Checking in

When time comes. Log unto a unix computer at CSC and give the following two commands

res checkin krypto09
course join krypto09

If you do not do this your results cannot be reported and you will miss vital information related to the course.

Handouts

The slides of Mats Näslund's lecture.

For those interested an interesting side-channel attack on AES.

Description of OTT and Vigenère, and Transposition.

The course memo.

The course analyis from last year (in Swedish).

A short summary of of last years lecturs with pointers to the book of Stinson.

Homework

Second homework is due on March 13. Helpfiles: ser1 ser2 ser3 ser4 ser5 N e

Please hand in the solutions to this homework on paper either to Johan Håstad's mail slot (at Lindstedtsvägen 3 level 4) or to him personally at his office in room 1435 at the same address.

The score of the first homework are now available in res.

The two fastest times for AES were Jesper Särnesjö 0.85 seconds and Jeremy Jean with 0.94 seconds. Congratulations on very efficient implementations!

First homework which is due February 16 and its helpfiles: unknown1 gskriv gskriv2

An essential part of the course is to make a presentation of one of the candidates in the SHA-3 competition. To get a passing grade on the course such a presentation is required.

There is a more detailed description of both these tasks in the homework rules.

The homework sets are supposed to be challenging, and even getting a passing grade (the grade E) will require some effort. Keep in mind however that you do not have to solve all the problems even to get a good grade. The idea is that it is better to solve some of the problems well than to solve all the problems partially, and solutions will be graded with this in mind.

Be sure to read also the code of honors before you start working on the problems!

Course book

We recommend Stinson: Cryptography, Theory and Practice, Chapman & Hall /CRC, 3rd edition. Another possibility that contains the material of the course is: Trappe, Washington "Introduction to Cryptography, with coding theory", Pearson International..

For the student interested in more details and depth about the theoretical foundations of cryptography we recommend Foundations of Cryptography by Oded Goldreich.

Many lectures are similar to the lectures from 2006 and for those there are course notes that can be found on that years home-page.

Schedule

 F 10-12 v 4-8,10   D41  
 F ti 15-17 v 4-8,10   D41 
 F to 10-12 v 4   D41 
 F on 10-12 v 10   Q21  
 F to 13-15 v 10   D41 

Links

  • A report on breaking two-time tape by two KTH students.
  • The SHA-3 competition.
  • NIST's page with FIPS documents giving many specifications of cryptographic functions.
  • IACR is an organization for cryptographic research.
  • Simon Singh's cipher challenge was won by a Swedish team in 2000.
Copyright © Sidansvarig: Johan Håstad <johanh@kth.se>
Uppdaterad 2010-01-12