Beruflich Dokumente
Kultur Dokumente
Handout 0
General Information
Staff
Teaching Assistant
Dr Volker Sorge
Ms Katrina Samperi
Office: 207
Office: 117
Tel: 43746
Tel: 43707
Email: V.Sorge@cs.bham.ac.uk
Email: K.Samperi@cs.bham.ac.uk
Office hours: Monday, 9–10am
Please email to make an appointment
URL: www.cs.bham.ac.uk/∼vxs
URL: www.cs.bham.ac.uk/∼kxs401
Lectures
Tuesdays, 2pm–3pm, Learning Centre UG05 (Building R28 on the Campus Map)
Friday, 11am–12pm, Biosciences E102 (Building R27 on the Campus Map)
Exercises
Friday, 2pm–3pm, Biosciences E102, (Building R27 on the Campus Map)
There will be a regular class in the first week of term on Friday, 30th September instead of an exercise
class.
Handouts
... will be provided (normally) on a weekly basis. Sources for all handouts (in PDF format) will be kept
on the webpage.
Spare copies are kept in the School Library.
The handouts will come in three parts: General lecture notes, Mathematical topics, and a Glossary. The
latter two are intended for looking things up when going through the lecture notes.
Assessment
... is in two parts:
Exam: 80% of your course mark will be determined by a 1.5-hour examination in May (or early June).
Continuous Assessment:20% of the mark is determined by continuous assessment.
Most handouts will contain an exercise section together with a deadline for handing in the solutions
(usually every week). Each exercise is worth a certain number of points. The total number of points
throughout the term will add up to 120% of marks. However, maximally 100% of marks can be counted
for he assessment mark, and every mark above 100% will be capped at 100%.
Homework must be handed in through one of the departmental pigeon holes on the Ground Floor (next to
the General Office) by the given deadline. Late submissions will not be accepted because I will provide
model answers to all exercises. Exercises are of a style similar to those appearing in the May examination
and they will be discussed in the exercise classes.
However, I will throw in the occasional programming exercise. Programming exercises can be done
in a programming language of your choice, provided that it is available under Linux on the School
computers. Solutions to programming exercises consist of the (commented) code, brief instructions how
1
to run it, and solutions to the questions posed in the exercises. Instructions how exactly to hand in
programming exercises will be given later.
Policy on plagiarism:
As preparation for the May exam I recommend that you attempt the exercises individually, but you
may still find it helpful to discuss the assignments with others. In any case, work submitted must be
formulated by yourself. If I find evidence of plagiarism then I will award zero marks without prior
warning, irrespective of whether you copied from others or whether your work was copied by others.
More serious cases will be dealt with according to the School’s policy on plagiarism, a copy of which is
kept at http://www.cs.bham.ac.uk/resources/studentinfo/plagiarism.htm
Resits
There is one resit opportunity for this course in September 2011 for students that are eligible. Please
consult http://www.cs.bham.ac.uk/internal/modules/resit.html for eligibility cri-
teria.
Textbooks
It is not necessary for you to buy a textbook for this course as the handouts should be sufficiently detailed
for revision and self-study. Some students, however, do like to see the material explained by another au-
thor and this can help to understand the more difficult parts. You can examine some of these textbooks
in the Central Library and the School Library.
A book on programming:
Hook: Beginning Cryptography with Java. John Wiley & Sons, 2005.
Web page
There is additional information about the syllabus and textbooks on the web page at
http://www.cs.bham.ac.uk/∼vxs/teaching/crypt/
2
Tentative Syllabus
• Overview on Historical Ciphers
• Symmetric Ciphers
– Block Ciphers
∗ DES (Feistel)
∗ AES (RIJNDAEL)
∗ Cryptomeria, AACS
– Stream Ciphers
∗ Pseudo-random generators/functions
∗ LFSR
∗ RC4, CSS
– Key Exchange and Management
∗ Diffie-Hellman-Merkle, Needham-Schroeder
– Cryptographic Hash Functions
∗ Merkle-Damgård
∗ MD4, MD5, SHA-1
– Message Authetication Codes
• Asymmetric Ciphers
• Digital Signatures
• Certificates
– VeriSign, PGP
• Quantum Cryptography
(A guest lecture by Steven Vickers)
• Permutations
• Finite Fields
• Matrix Arithmetic