Lectures: Tue 5-7 pm Thu 5-6 pm Room BV 260
Textbook: Introduction to CRYPTOGRAPHY with CODING THEORY (2nd edition) - by Trappe & Washington. Prentice Hall, 2006. For most of the course, the 1st edition is also fine, but expect some inconveniences, like missing exercises and sections. Several copies of the 2nd edition are available in the UTSC library.
Cryptography deals with communication over non-secure channels. Coding theory deals with communication over noisy channels. In real life they are often used together. The design of good crypto- and coding systems uses a lot of math, mainly number theory and algebra. Assessing the strength of these systems usually requires probability, information theory, complexity theory. We will discuss the most important topics of cryptography and coding theory, picking up the necessary math along the way. The topics will hopefully include:
I: Fundamental Principles of Cryptology; Classical Cryptosystems and Their Analysis
II: Modern Private Key Cryptosystems: Data Encryption Standard; Advanced Encryption Standard (Rijndael)
III: Public Key Encryption (e.g., RSA, discrete log based systems)
IV: Applications of Cryptography (e.g., digital signatures, security protocols, zero-knowledge identification, games)
V: Coding Theory (error correcting codes and cryptographic applications)
VI: Techniques from Number theory, Finite fields, Elliptic curves, Probability, Complexity Theory, Information Theory
VII: Quantum Computers
Four HW assignments, one due every 3 weeks Midterm Test Final Exam |
4 times 10% 25% 35% |
Why the attack against Vigenere works.
Two proofs of the formula for Euler's phi function.
Here is the 2007 midterm test, from Prof Paul Selick.
Here is the 2009 midterm test and the solutions.
In 2009, the assignments included a project: an exposition exploring either a topic in Cryptology or Coding Theory which was not covered in lectures or going into more detail on a topic covered in lectures. Here are my project suggestions. These could be interesting to look at if you want to explore cryptography beyond the course material. Also, the extra topics for HW4 will be a subset of these.