MA 479 / CSSE 490: Cryptography
Course Schedule

Rose-Hulman Institute of Technology
A joint effort of the
Department of Mathematics
and the Department of Computer Science & Software Engineering
Spring term, 2002-2003

Please take this schedule as our "best guess" at this time. Small changes will undoubtedly be necessary.

Reading are from Cryptography and Network Security: Principles and Practice (Third edition), by William Stallings, Prentice-Hall, 2002, unless stated otherwise.

Week Date Topics Reading Homework Major
Due Dates
10 Mar  Examples from 
Classical Cryptosystems
Chapter 1 (skim)    
  11 Mar  Types of cryptosystems 
and types of attacks
Chapter 2, 
Sections 1 and 2
   
  13 Mar  Modular arithmetic 
and affine ciphers
Rest of Chapter 2  Homework 1
assigned
 
  14 Mar  Crypto discussion     Crypto
through p. 65 
Also a handout
17 Mar  Perfect secrecy Reread pp. 29-30 
Also see the lecture notes
   
  18 Mar  Simplified DES 
(Data Encryption Standard)
Chapter 3, Section 1    
  20 Mar  DES 
(Data Encryption Standard)
Chapter 3, 
Sections 2 and 3
Homework 2
assigned
Homework 1 due
    Rose-Hulman 
Undergraduate Math conference.
No class, but please attend 
a talk at the conference
     
24 Mar  Breaking DES: 
Brute force cryptanalysis 
Breaking DES: 
Differential cryptanalysis
Chapter 3, 
Sections 4 and 5
   
  25 Mar  Breaking DES: 
Differential cryptanalysis
Lecture notes    
  27 Mar  Design principles for block ciphers 


Design principles for AES 
(Advanced Encryption Standard)
Chapter 3, Section 6
Chapter 5, Section 1
Communications Security 
for the Twenty-first Century: 
The Advanced Encryption Standard
Advanced Encryption Standard 
(AES) Questions and Answers
  Please do the readings 
before class 
so that we can have 
a meaningful discussion
  28 Mar  Finite fields for AES  Chapter 4, 
Sections 1 through 3 
   
31 Mar  Finite fields for AES Chapter 4, 
Sections 4 and 5 
Homework 3
assigned
Homework 2 due
  1 Apr  Finite fields for AES Rest of Chapter 4     
  3 Apr  The AES cipher Chapter 5, section 2 
Readings on AES
   
  4 Apr  Crypto discussion: 
Public key
    Crypto, pp. 66 -- 89
7 Apr  Principles of 
public key cryptosystems 
The RSA 
(Rivest, Shamir, Adleman) 
public key cryptosystem
Chapter 9, Section 1 Homework 4
assigned
Homework 3 due
  8 Apr  Crypto discussion: 
Prime time
    Crypto, pp. 90 -- 124
  10 Apr  Number theory 
for RSA 
Chapter 8, 
Sections 1 and 2
   
  11 Apr  Correctness of RSA  Chapter 9, Section 2    
14 Apr  Efficiency of RSA: 
Fast exponentiation
Chapter 9, Section 2    
  15 Apr  Efficiency of RSA: 
Primality testing
Chapter 8, Section 3    
  17 Apr  Security of RSA: 
Factoring
Article by Pomerance
on Factoring 
Other Attacks on RSA
Lecture notes
Begin thinking about 
your presentation
Homework 5
assigned
Homework 4 due
  18 Apr  Diffie-Helman Key Exchange Chapter 10, Section 2    
28 Apr  Elliptic Curve Cryptography (ECC) Chapter 10, Section 3
Lecture notes
   
  29 Apr  Authentication and digital signatures Chapter 13, Sections 1 and 2    
  1 May  Elliptic Curve Cryptography (ECC)  Chapter 10, Section 4
Lecture notes
   
  2 May  Crypto discussion     Crypto, pp. 125 -- 186
Presentation article 
submitted 
for approval
5 May  Prepare for presentations: 
How to give a (bad) talk
     
  6 May  Crypto discussion     Crypto
pp. 187 -- 225
  8 May  Prepare for presentations 
(no class) 
     
  9 May  Prepare for presentations 
(no class) 
     Homework 5 due
12 May  Prepare for presentations 
(no class) 
   Homework 6
assigned
 
  13 May  Presentations 
in class AND outside of class!
     
  15 May  Presentations 
in class AND outside of class!
     
  16 May  Presentations 
in class AND outside of class!
     
10  19 May  Presentations 
in class AND outside of class!
     
  20 May  Presentations 
in class AND outside of class!
    Math-inspired portion of Homework 6 due
  22 May  Subliminal channels and/or Zero-knowledge proofs     CS-inspired portion of Homework 6 due (by noon)
  23 May  Crypto discussion
Course evaluation
    Crypto,
pp. 226 to end
11  26 May        Research proposals due to David Mutchler by email by noon