MA 479 / CSSE 479: Cryptography
Course Schedule

Rose-Hulman Institute of Technology
A joint effort of the
Department of Mathematics
and the Department of Computer Science & Software Engineering
Spring term, 2003-2004

Please take this schedule as my "best guess" at this time. Small (or large) changes will undoubtedly be necessary.

Reading are from Cryptography and Network Security: Principles and Practice (Third edition), by William Stallings, Prentice-Hall, 2002, unless stated otherwise.

Week Date Topics Reading Homework Major
Due Dates
8 Mar Examples from
classical cryptosystems
Chapter 1 (skim)    
  9 Mar Types of cryptosystems
and types of attacks
Chapter 2,
Sections 1 and 2
   
  11 Mar Modular arithmetic
and affine ciphers
Rest of Chapter 2 Homework 1
assigned
 
  12 Mar Crypto discussion     Crypto,
through p. 65
2 15 Mar  Perfect secrecy Reread pp. 29-30
Lecture notes
   
  16 Mar Feistel ciphers
Simplified DES
(Data Encryption Standard)
Chapter 3, Section 2    
  18 Mar Simplified DES
(Data Encryption Standard)
Chapter 3, Section 1 Homework 2
assigned
Homework 1 due
  19 Mar DES Chapter 3, Section 3    
3 22 Mar Breaking DES:
Brute force cryptanalysis
Breaking DES:
Differential cryptanalysis
Chapter 3,
Sections 4 and 5
   
  23 Mar Breaking DES:
Differential cryptanalysis
Handout from class    
  25 Mar Design principles for block ciphers



Design principles for AES
(Advanced Encryption Standard)
Chapter 3, Section 6
FIPS 46 (handout)
Chapter 5, Section 1
Communications Security
for the Twenty-first Century:
The Advanced Encryption Standard
Advanced Encryption Standard
(AES) Questions and Answers
  Please do the readings
before class
so that we can have
a meaningful discussion
  26 Mar Finite fields for AES Chapter 4, Section 5 Homework 3
assigned
Homework 2 due
4 29 Mar Finite fields for AES Chapter 4, Section 6    
  30 Mar AES Chapter 5, section 2
Readings on AES
   
  1 Apr Simplified AES Handout from class Homework 4
assigned
Homework 3 due
  2 Apr Crypto discussion:
Public key
    Crypto, pp. 66 -- 89
5 12 Apr Principles of
public key cryptosystems
Exponential ciphers
Chapter 9, Section 1
Lecture notes
   
  13 Apr Crypto discussion: 
Prime time
    Crypto, pp. 90 -- 124
  15 Apr Number theory
for the RSA
(Rivest, Shamir, Adleman)
public key cryptosystem
Chapter 8,
Sections 1 and 2
Homework 5
assigned
Homework 4 math due
Homework 3.5 CS due
  16 Apr RSA Chapter 9, Section 2 Begin thinking about
your presentation
 
6 19 Apr Efficiency of RSA:
Fast exponentiation
Handout from class   Homework 4 CS due
  20 Apr Efficiency of RSA:
Primality testing
Chapter 8, Section 3    
  22 Apr Security of RSA:
Factoring
Article by Pomerance
on Factoring
Other Attacks on RSA
Lecture notes
   
  23 Apr Security of RSA:
Factoring
Diffie-Hellman Key Exchange
Chapter 10, Section 2 Homework 6
assigned
Homework 5 due

Presentation article
submitted
for approval

7 26 Apr Diffie-Hellman Key Exchange Lecture notes    
  27 Apr Authentication and digital signatures Chapter 11, Section 1
Chapter 13, Sections 1 and 2
Lecture notes
   
  29 Apr Elliptic Curve Cryptography (ECC) Chapter 10, Section 3
Lecture notes
Homework 7
assigned
Homework 6 due
  30 Apr Crypto discussion     Crypto, pp. 125 -- 186
8 3 May Elliptic Curve Cryptography (ECC) Chapter 10, Section 4
Lecture notes
   
  4 May Crypto discussion     Crypto,
pp. 187 -- 225
  6 May Prepare for presentations:
How to give a (bad) talk
  Begin thinking about
your research proposal

  7 May Prepare for presentations
(no class)
     
9 10 May Prepare for presentations
(no class)
     Homework 7 due
  11 May The Digital Signature Algorithm (DSA) and subliminal channels Chapter 13, Section 3
Lecture notes
   
  13 May Presentations
in class
     
  14 May Presentations
in class
     
10 17 May Presentations
in class
     
  18 May Presentations
in class
Bit Commitment Schemes
     
  20 May Zero-knowledge proofs      
  21 May Crypto discussion
Course evaluation
    Crypto,
pp. 226 to end
Finals 24 May       Research proposals due