Course Catalog 2014-2015
Basic

Basic Pori International Postgraduate Open University

|Degrees|     |Study blocks|     |Courses|    

Course Catalog 2014-2015

MAT-63256 Mathematical Cryptology, 7 cr

Additional information

The course is lectured biennially.
Suitable for postgraduate studies

Person responsible

Stephane Foldes

Lessons

Study type P1 P2 P3 P4 Summer Implementations Lecture times and places
Lectures
Excercises


 


 
 24 h/per
 2 h/week
+24 h/per
+2 h/week


 
MAT-63256 2014-01 Monday 15 - 16 , TB224
Thursday 17 - 19 , TB224
Friday 15 - 17 , TB224
Monday 15 - 19 , TD308
Thursday 17 - 19 , TD308
Wednesday 17 - 19 , TD308
Friday 16 - 19 , TD308
Tuesday 17 - 19 , TD308

Requirements

Open-book written exam.
Completion parts must belong to the same implementation

Learning Outcomes

After completing the course the student is familiar with the mostly used cryptosystems in modern cryptography, and their basic properties. The student also masters the required prerequisites in number theory and algebra. In particular, the student identifies the division of algorithms into intractable and tractable, so essential in cryptography. Completing the course the student is able to identify common cryptosystems, and evaluate their advantages and disadvantages, and the underlying mathematical paradigms. Despite modern cryptology being the result of relatively recent research, it has progressed far and wide, and therefore it is simply not possible to include outcomes for it all within a single course. Completing the course the student nevertheless should be able the generalize and extend the skills.

Content

Content Core content Complementary knowledge Specialist knowledge
1. Elements and basic algorithms of number theory and algebra. Simple examples.  Applications to analysis of more complex cases. Alternative algorithms.   
2. The AES cryptosystem, its goals and algebraic background.  Further analysis of the AES cryptosystem.   
3. Computational complexity and its relation to cryptographic concerns, in particular to public-key systems.     
4. The RSA cryptosystem, its goals, analyses and number-theoretic background.  Further analysis of RSA, its variants and special uses.   
5. Cryptosystems based on group-theoretic concepts: ELGAMAL, DIFFIE-HELLMAN, ECC.  Further analyses of these systems, their variants and special uses.   
6. Overview of the NTRU cryptosystem.    Further analysis and structure of NTRU. 
7. Quantum encryption, its background and systems.     

Instructions for students on how to achieve the learning outcomes

Final grade is determined from tutorial activity and mainly from the final open-book exam. Passing the course requires passing the final exam, and for this at most half of the maximum points are required. Bonus assessment obtained by tutorial activity may be used to add the exam points according to a given scheme. A thorough mastering of the core content should be sufficient for passing the course with grade 3. To get the degree 4 at least some complementary knowledge is usually required, getting the grade 5 then requires a more thorough mastering of this knowledge.

Assessment scale:

Numerical evaluation scale (1-5) will be used on the course

Partial passing:

Completion parts must belong to the same implementation

Study material

Type Name Author ISBN URL Edition, availability, ... Examination material Language
Book   Alan Turing: The Enigma   Andrew Hodges       complementary material, ref. to Hodges book and its translation to Finnish and other languages   No    English  
Book   An Introduction to Cryptography   Mollin, R.A.   1-58488-127-5     complementary material, recommended by K. Ruohonen   No    English  
Book   An Introduction to Mathematical Cryptography   Hoffstein, J., Pipher, J., Silverman, J.H.   978-0-387-77993-5     complementary material, recommended by K. Ruohonen   No    English  
Book   Fundamental Structures of Algebra & Discrete Mathematics   Foldes       will be used in class, copy available in TUT library   No    English  
Other online content   FISH and I   William T. Tutte         No    English  
Other online content   Hodges web page   Andrew Hodges         No    English  
Other online content   The Imitation Game   Director: Morten Tyldum Writers: Andrew Hodges (book), Graham Moore (screenplay)       trailer of 2014 movie about Turing / Government Code and Cypher School based on book by Andrew Hodges   No    English  
Summary of lectures   Matemaattinen kryptologia   Ruohonen, K.         No    Suomi  
Summary of lectures   Mathematical Cryptology   Ruohonen, K.       will be used in class, copy available on the internet   No    English  

Prerequisites

Course Mandatory/Advisable Description
MAT-60050 Algebra Advisable   1
MAT-60056 Algebra Advisable   1
MAT-02650 Algoritmimatematiikka Advisable    

1 . The courses are interchangable.

Prerequisite relations (Requires logging in to POP)



Correspondence of content

Course Corresponds course  Description 
MAT-63256 Mathematical Cryptology, 7 cr MAT-52606 Mathematical Cryptology, 6 cr  

More precise information per implementation

Implementation Description Methods of instruction Implementation
MAT-63256 2014-01 Lectures and tutorials of Mathematical Cryptology.       Contact teaching: 0 %
Distance learning: 0 %
Self-directed learning: 0 %  

Last modified23.12.2014