What is crypto? (Old) Ciphers: substitution cipher, polyalphabetic, Vigenere, Enigma. Perfect secrecy, Vernam cipher.

Designing a good pseudo-random permutation generator. Distinguishers. Additional readings: (Not so) random Shuffles of RC4, Randomized stopping times and provably secure pseudorandom permutation generators

Assignment 1 (13-17 III)

Assignment 2 (20-24 III)

Assignment 3 (3-7 IV)

June 30, 2017: A1.314 - 10:00-14:00

July 7, 2017: A1.314 - 10:00-14:00

Final grade is computed from partial grades: Egzam (50%), Labs (30%), Classes (20%)

To pass classes you need to get 2 * L points where L is the number of assignents. You get points by declaring which exercises you can solve (and then possibly you are asked to present a solution in front of the class).

To pass labs, you need to get 50 (out of 100) points

Grades: 3 - from 50%, 4 - from 70%, 5 - from 85%

- Handbook of Applied Cryptography (www) - A. J. MenezesP. C. van OorschotS. A. Vanstone
- Cryptography. Theory and practice - Douglas R. Stinson
- Introduction to modern cryptography - Jonathan KatzYehuda Lindell
- The Foundations of Cryptography (www) - Oded Goldreich
- Lecture Notes on Cryptography (www) - S. GoldwasserM. Bellare