Secure communications: encryption and decryption. Entropy, equivocation and unicity distance. Cryptanalysis and computational complexity. Substitution, transposition and product ciphers. Data Encryption Standard (DES): block and stream cipher modes. Modular arithmetic. Public key cryptosystems: RSA, knapsack. Factorization methods. Elliptic curve cryptography. Authentication methods and cryptographic protocols.
Prerequisites: solid familiarity with basic concepts in applied cryptography.
In particular, it is strongly recommended that the following course (or its equivalent) should be taken, or at least audited, prior to this course in order to obtain the relevant background:
· CSI4108 or COMP4109 (cryptography)
Course outline (please read thoroughly to avoid any difficulties later in the semester)
As discussed in the first lecture, electronic devices (phones, tablets, laptops) are not to be used in class without explicit permission. Please comply with this.