Course code: 2DMI00
Lecturer: Berry Schoenmakers, MF 6.105, email@example.com (or, firstname.lastname@example.org)
Schedule 2018-19 3rd Quarter
- Wednesdays 10.45-12.30h (3rd+4th hour) at metaforum 13
- Fridays 13.30-15.15h (5th+6th hour) at flux 1.08
|Lecture 1||February 6. Preface, Sections 1.1, 1.2.1-3, 2.1.1.|
|Lecture 2||February 8. MPyC, Sections 1.2.4, 1.3.1-2.|
|Lecture 3||February 13. Sections 1.3.2-3.|
|Lecture 4||February 15. Sections 1.3.4, 2.1.2.|
|Lecture 5||February 20. Sections 2.1.3-4, 2.2.|
|Lecture 6||February 22. Chapter 3, Sections 4.1-3, click to try notebook OneWayHashChainsExplained.ipynb.|
|Lecture 7||February 27. Sections 4.4, 4.5.1-2.|
|Lecture 8||March 1. Section 4.5.3, Figure 4.5, Sections 5.1, 5.2.1-2.|
|Lecture 9||March 13. Sections 4.6, 5.2.3-4, 5.3.|
|Lecture 10||March 15. Sections 5.2.5, 5.4.1.|
|Lecture 11||March 20. Sections 5.4.2-3, Example 6.1.|
|Lecture 12||March 22. Chapter 6.|
|Lecture 13||March 27. Sections 7.1-2.|
|Lecture 14||March 29. Sections 7.3, Chapter 8, MPyC.|
Written exam: Friday April 12, 2019, 13.30-16.30h; resit: Friday June 28, 2019, 18.00-21.00h.
Version 1.4 of the Lecture Notes on Cryptographic Protocols (incl. solutions to all exercises) is available as of February 2, 2019. Please print out a copy for yourself.
Also see the matching Lecture Slides on Cryptographic Protocols. (Handout version of slides without animations).
All exams since 2004 are available as well. Solutions to the exam problems will not be provided.
The following books are recommended as background and advanced resources:
- A Computational Introduction to Number Theory and Algebra (Version 2) by Victor Shoup, Cambridge University Press, 2008. Great textbook providing extensive background, and beyond. Free download available.
- Secure Multiparty Computation and Secret Sharing by Ronald Cramer, Ivan Damgård, and Jesper Buus Nielsen, Cambridge University Press, 2015. Great expository text on information-theoretic secure multiparty computation and supporting techniques. See online information.
- Cryptography: An Introduction by Nigel Smart, McGraw-Hill, 2003. Modern introduction at a reasonable level of detail. The 3rd edition can still be downloaded for free. Text has been reworked into a new book Cryptography Made Simple.
- Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell, Chapman & Hall/CRC Press, 2007. An extensive, rigorous, yet accessible treatment of modern cryptography, based on formal security definitions and with security proofs; mostly covering basic encryption and authentication techniques though. See online information.
- Foundations of Cryptography by Oded Goldreich, 2001 (Vol. 1), 2004 (Vol. 2). Thorough treatment of theoretical results in cryptography, with an extensive treatment
of zero-knowledge protocols and general two/multi-party protocols. See online information.
- Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial by Henk van Tilborg, Kluwer Academic Publishers, 2000. See online information. Classic text with many worked examples in Mathematica (PDF and Mathematica notebook).
- Cryptography: Theory and Practice by Douglas Stinson, 3rd edition, CRC Press, 2005. See online information.
- Complexity and Cryptography: An Introduction by John Talbot and Dominic Welsh, Cambridge University Press, 2006. Accessible treatment mainly of cryptographic algorithms, but also of some cryptographic protocols, combined with the relevant notions and ideas of computational complexity. See online information.
- Handbook of Applied Cryptography by Alfred Menezes, Paul C. van Oorschot, and Scott Vanstone, 1997. Download for free at http://www.cacr.math.uwaterloo.ca/hac/.
Last year's course page.