bild
Skolan för
elektroteknik
och datavetenskap

Schedule

We now have a final schedule: PDF, ICS

ATTENTION! The central KTH schedule incorrectly states that Lecture 15 takes place Wednesday 10 March. The last lecture takes place Thursday 11 March in Q33. Note that this is a slight change of lecture room from Q31 to Q33.

The deadline of Homework 2 has been extended.

Lecture Week Day Date Time Place Tentative Content
L1 3 Tue Jan 19 10:00-12:00 D34 Introduction and classical cryptography.
L2 3 Fri Jan 22 13:00-15:00 D41 Symmetric ciphers, perfect secrecy, entropy.
L3 4 Tue Jan 26 10:00-12:00 Q33 Substitution-permutation networks and linear cryptanalysis.
L4 4 Thu Jan 28 13:00-15:00 Q33 AES, Feistel Networks, and Luby-Rackoff.
L5 5 Tue Feb 2 10:00-12:00 V34 Luby-Rackoff, DES, Modes of Operations, DES-Variants
L6 5 Thu Feb 4 15:00-17:00 Q34 Elementary Number Theory, Public-Key Cryptography, RSA,
L7 5 Fri Feb 5 10:00-12:00 E2 RSA, Primality Testing
L8 7 Tue Feb 16 10:00-12:00 Q34 Textbook RSA and Semantic Security.
L9 7 Thu Feb 18 08:00-10:00 Q34 RSA in ROM, Rabin, Diffie-Hellman, El Gamal, Discrete Logarithms
L10 8 Tue Feb 23 13:00-15:00 Q33 Security Notions of Hashfunctions, Random Oracles, Iterated Constructions, SHA-1, Universal Hashfunctions.
L11 8 Thu Feb 25 13:00-15:00 Q34 Message Authentication Codes, Identification schemes, and signature schemes.
L12 9 Tue Mar 2 13:00-15:00 Q31 PKI and Elliptic curve cryptography.
DEADLINE 9 Tue Mar 2 13:00 Stud.exp. Homework 1
L13 9 Thu Mar 4 08:00-10:00 Q34 Guest lecture by Mats Näslund about cryptography in GSM/UMTS.
DEADLINE Mar 8 - Mar 19 Oral Presentation, Oral Exam
L14 10 Tue Mar 9 13:00-15:00 Q33 Pseudorandom generators.
L15 10 Thu Mar 11 10:00-12:00 Q33 (Verifiable) Secret Sharing and Joint Decryption
DEADLINE 11 Fre Mar 19 09:00 Stud.exp. Written Research Presentation
DEADLINE 12 Fre Mar 26 10:00 Stud.exp. Homework 2

Stud.exp. means "Studentexpeditionen", floor 2 in the E-house.

You will be able to book times for your oral presentation (and oral exam) here.

Lecture 13

This was a guest lecture by Mats Näslund from Ericsson Research. Mats Näslund is a Senior Specialist, Ericsson Research and Tekn Dr, NADA KTH 1998.

Title of Talk:
Cryptography in Mobile Networks

Abstract:
The GSM system is most likely the world's largest application for
mass-use of cryptography. There are a lot of rumors and misconceptions
about GSM security that I will try to explain. I will briefly discuss
the improvements made in the UMTS ("3G") system (made possible by more
liberal regulations/laws around use of "strong crypto"). The main part
of the talk will focus on the even more sophisticated cryptographic
mechanisms in the new LTE ("4G") system.

Copyright © Sidansvarig: Douglas Wikström <dog@csc.kth.se>
Uppdaterad 2010-03-10