Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: http://www.site.uottawa.ca/~cadams/index_files/seecshead.gif

ELG5373 (Registered at Carleton University as EACJ5105)

 

Data Encryption

Secure communications: encryption and decryption. Entropy, equivocation and unicity distance. Cryptanalysis and computational complexity. Substitution, transposition and product ciphers. Data Encryption Standard (DES): block and stream cipher modes. Modular arithmetic. Public key cryptosystems: RSA, knapsack. Factorization methods. Elliptic curve cryptography. Authentication methods and cryptographic protocols.

 

Prerequisites: solid familiarity with basic concepts in applied cryptography.

In particular, it is strongly recommended that the following course (or its equivalent) should be taken, or at least audited, prior to this course in order to obtain the relevant background:

         CSI4108 or COMP4109 (cryptography)

 

Course outline (please read thoroughly to avoid any difficulties later in the semester)

As discussed in the first lecture, electronic devices (phones, tablets, laptops) are not to be used in class without explicit permission. Please comply with this.

 

***

***

NOTE: if you have not yet done the evaluation for this course, please complete it (at https://uottawa.ca/tces) before April 6th. Thanks very much!

***

***

 

Assignment #1 is now available. (These slides on the AES round operations may be helpful for the first question.)

Assignment #2 is now available.

Assignment #3 is now available. (Extension: this assignment can be submitted up to March 15th without penalty.)

 

***

For those of you that are still searching for an appropriate project paper, please recall that the paper you choose must include a focus on the security of an encryption algorithm.

These discussions can get very technical and difficult with lots of detailed formalism, but they do not need to be like this to be appropriate for this project.

A fairly straightforward example of a 2015 paper is here (see Section 5) a more recent paper like this would be completely fine as a choice. Hope this helps!

***

Here is a list of the approved projects, including an indication of those that have been selected for an oral presentation in class (the remainder will do a written report only).

 

***

***

As you put the final touches on your report and presentation this week, this marking scheme may help you to ensure that you have all the required content.

For submission, please e-mail a copy of your report to the Corrector (using the subject line ELG 5373 Final Report on the e-mail). You may also bring a hard copy to class if you wish, but it is not necessary.

***

***

 

 

Figure on group, ring, and field definitions