MTAT » ATI » Sven Laur » Courses » Cryptology II
2008

MTAT.07.003 Cryptology II

Important details

Requirements

Prerequisites to Cryptology II course are

If the formal requirements of the ÕIS do not permit registration then write me an email or talk with me. After that we decide whether to enrol you or not. Secondly, active participation in the course is absolute necessity. You must participate in most lectures or otherwise you are not allowed to take the exam. Special arrangements are possible but not advised.

The course grade is determined by three components:

In a nutshell, first two components give a base level grade and the exam can increase or decrease the base level grade by one grade point.

Formal grading system

  1. Participation. Student gets grade F if he or she misses 3 or more lectures. Student gets grade F if he or she misses 3 or more exercise sessions.
    In reasonable circumstances, it is possible to compensate missed lectures or exercise sessions by extra work. Details are determined by individual agreements with the lecturer.
  2. Active participation. Students are entitled to get from 0 to 40 points from exercise sessions. Points are given by aggregating points of individual exercise sessions.
  3. Final report. Each student gets a research topic and must write a 6-10 page report. The report can give up 50 points.
  4. Extra points. Students can get extra points from additional exercises.
  5. Final grading and exam. All points specified above are summarised before the exam. The exam might change this sum up to 10 points in both directions. Next, the grade is determined by the standard university scale: 0-50 (F), 51-60 (E), 61-70 (D), 71-80 (C), 81-90 (B), 91-100 (A). A Gentleman's agreement: the exam result cannot decrease grade from E to grade F.

Tentative Schedule

I Theoretical Background

Lecture ( PDF) Literature: Exercise session ( PDF, exercises 1--5, baseline 3.75 exercises)

II Computational Indistinguishability

Lecture ( PDF ) Additional materials Exercise session ( PDF, 1--6, baseline 4.0 exercises)

III Cryptosystems

Lecture ( PDF ) Exercise session I ( PDF, 1--6, baseline 4 exercises) Exercise session II ( PDF, 1--6, baseline 4 exercises)

IV Message Authentication

Lecture ( PDF) Exercise session ( PDF, 1--6, baseline 3 exercises)

V Commitment schemes

Lecture ( PDF) Exercise session ( PDF, 1--8, baseline 4 exercises) Extra lecture: Crash Course to Coin Flipping ( PDF)

VI Entity authentication

Lecture ( PDF) Exercise session ( PDF, baseline 3.5 exercises) Exercise session ( PDF, baseline 4 exercises)

VII Digital Signatures

Lecture ( PDF) Exercise session (PDF, baseline 3.75 exercises)

VIII Zero-knowledge proofs

Lecture ( draft ) Exercise session ( PDF , baseline 3 exercise)

X Oblivious Transfer

Lecture ( PDF ) Exercise session ( PDF , baseline 4 exercises)

IX Secure Computation

Lecture ( PDF ) Exercise session

XII Composability

Lecture ( PDF ) Exercise session

XI Crypto-Computing

Lecture Exercise session

XIII Design of Complex Protocols

Lecture Exercise session

XIV-XVI Various Obscure Topics


Additional Materials