Course code: 2DMI00
Lecturer: Berry Schoenmakers, MF 6.105, firstname.lastname@example.org (or, email@example.com)
Schedule 2019-20 3rd Quarter
- Wednesdays 10.45-12.30h (3rd+4th hour) at fenix 0.136
- Fridays 13.30-15.15h (5th+6th hour) at fenix 0.136
|Lecture 1||February 5. Preface, Sections 1.1, 1.2.1-3.|
|Lecture 2||February 7. Sections 1.2.4, 1.3.1-2.|
|Lecture 3||February 12. Section 1.3.3.|
|Lecture 4||February 14. Section 1.3.4, Appendix A "Fundamental Lemma of Cryptology." Click to try MPyC.|
|Lecture 5||February 19. Section 2.1.|
|Lecture 6||February 21. Section 2.2, Chapter 3.|
|Lecture 7||March 4. Sections 4.1-4, 4.5.1-2.|
|Lecture 8||March 6. Sections 4.5.3, 4.6, 5.1, 5.2.1-2.|
|Lecture 9||March 11. Sections 5.2.3-4, 5.3.|
|Lecture 10||Self-study video. Sections 5.2.5, 5.4.1.|
|Lecture 11||Self-study video. Sections 5.4.2-3.|
|Lecture 12||Self-study video. Chapter 6.|
|Lecture 13||Self-study video. Chapter 7.|
|Lecture 14||Self-study video. Chapter 8, MPyC.|
Written exam: Saturday April 18, 2020, 13.30-16.30h; resit: Friday June 26, 2020, 18.00-21.00h.
Version 1.5 of the Lecture Notes on Cryptographic Protocols (incl. solutions to all exercises) is available as of February 2, 2020. Please print out a copy for yourself.
Also see the matching Lecture Slides on Cryptographic Protocols. (Handout version of slides without animations).
All exams since 2004 are available as well. Solutions to the exam problems will not be provided.
The following books are recommended as background and advanced resources:
- A Computational Introduction to Number Theory and Algebra (Version 2) by Victor Shoup, Cambridge University Press, 2008. Great textbook providing extensive background, and beyond. Free download available.
- Secure Multiparty Computation and Secret Sharing by Ronald Cramer, Ivan Damgård, and Jesper Buus Nielsen, Cambridge University Press, 2015. Great expository text on information-theoretic secure multiparty computation and supporting techniques. See online information.
- Cryptography: An Introduction by Nigel Smart, McGraw-Hill, 2003. Modern introduction at a reasonable level of detail. The 3rd edition can still be downloaded for free. Text has been reworked into a new book Cryptography Made Simple.
- Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell, Chapman & Hall/CRC Press, 2007. An extensive, rigorous, yet accessible treatment of modern cryptography, based on formal security definitions and with security proofs; mostly covering basic encryption and authentication techniques though. See online information.
- Foundations of Cryptography by Oded Goldreich, 2001 (Vol. 1), 2004 (Vol. 2). Thorough treatment of theoretical results in cryptography, with an extensive treatment
of zero-knowledge protocols and general two/multi-party protocols. See online information.
- Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial by Henk van Tilborg, Kluwer Academic Publishers, 2000. See online information. Classic text with many worked examples in Mathematica (PDF and Mathematica notebook).
- Cryptography: Theory and Practice by Douglas Stinson and Maura Paterson, 4th edition, CRC Press, 2018. See online information.
- Complexity and Cryptography: An Introduction by John Talbot and Dominic Welsh, Cambridge University Press, 2006. Accessible treatment mainly of cryptographic algorithms, but also of some cryptographic protocols, combined with the relevant notions and ideas of computational complexity. See online information.
- Handbook of Applied Cryptography by Alfred Menezes, Paul C. van Oorschot, and Scott Vanstone, 1997. Download for free at cacr.uwaterloo.ca/hac/.
Last year's course page.