Cryptography and Network Security
Exam
Year | Semester | Date | Period | Language | In charge |
---|---|---|---|---|---|
2012 | autumn | 29.10-05.12. | 2-2 | English | Timo Karvi |
Lectures
Time | Room | Lecturer | Date |
---|---|---|---|
Mon 12-14 | C222 | Timo Karvi | 29.10.2012-05.12.2012 |
Wed 10-12 | C222 | Timo Karvi | 29.10.2012-05.12.2012 |
Thu 12-14 | CK107 | Timo Karvi | 29.11.2012-29.11.2012 |
Exercise groups
Time | Room | Instructor | Date | Observe |
---|---|---|---|---|
Wed 12-14 | C222 | Timo Karvi | 05.11.2012—07.12.2012 |
Time | Room | Instructor | Date | Observe |
---|---|---|---|---|
Thu 10-12 | B222 | Timo Karvi | 05.11.2012—07.12.2012 |
The lecture on Monday 26th of November has been moved to Thursday 29th of November at 12 room CK107!
General
General
The aim of this course is to give a brief exposition of three topics. The first topic deals with the symmetric cipher AES (Advanced Encryption Standard) and public key cryptography based on RSA. These two techniques are used nearly in all the security protocols. Moreover, the first part tries to give a firm foundation on basic mathematical theories which are used in cryptographical constructions. The second topic is devoted to the study of the design of key agreement protocols. These protocols usually form the first part of more general security protocols. Their design is quite delicate and it is easy to make errors which open ways to attacks. The third topic consists of group key agreement protocols or conference protocols as they are also called..
Completing the course
Passing the course
The course can be passed in two ways. The recommended alternative is to take part in the course and its exercises and then going to a course exam. In this exam, the points (0-6) got from the exercises are taken into account when the final grade is determined. The course exam can produce at most 54 points and you can pass the course with 30 points. The second alternative is to take part in a separate exam, where the exercise points are not taken into account.
.
The course exam date:
1) December 14, 16-19, room A111 (check the room still before the exam!)
Literature and material
Material
The lecture slides are published weekly on this page before the actual lectures.
If you prefer books, you can follow the following books:
- W. Stallings: Cryptography and Network Security, 4th or 5th edition.
- Boyd and Mathuria: Protocols for Authentication and Key Establishment, Springer 2003.