Valid for: 2013/14
Decided by: Education Board A
Date of Decision: 2013-04-15
Elective for: C4, C4-ks, D4, D4-ks, Pi4, Pi4-pv
Language of instruction: The course will be given in English on demand
The purpose of the course is to demonstrate how advanced mathematical theory has important applications in cryptology and security.
Knowledge and understanding
For a passing grade the student must
Competences and skills
For a passing grade the student must
Judgement and approach
For a passing grade the student must
The course contains a number of mathematical tools with many applications, not only in cryptology and security. Most schemes addressed in the course are standards in different communication systems, e.g., elliptic curve cryptosystems. But few people have the mathematical background to be able to understand how such systems work. We also look at models for proving that a cryptographic scheme or protocol is secure.
The content of the course is more specifically most of the following topics: cryptosystems based on discrete logarithms, elliptic curve cryptography, factoring and the discrete log problem, symmetric ciphers, digital signatures and hash functions, authentication, secret sharing, complexity theory, provable security and random oracles.
Grading scale: TH
Assessment: Written exam and mandatory home exercises.
Required prior knowledge: Basic math courses. Basic programming.
The number of participants is limited to: No
The course overlaps following course/s: EDI075
Course coordinator: Professor Thomas Johansson, thomas@eit.lth.se
Course homepage: http://www.eit.lth.se/course/
Further information: With less than 16 participants, the course may be given with reduced teaching and more self studies.