ICE-EM Logo

Cryptography

Duration
Four Weeks
Lecturer
David Kohel (University of Sydney)
Assessment
80% Final exam (Friday 9 Feb 14–16h in Carslaw Room 351), 20% assignments.
Consultation Hours:
Thursdays 14–15h Carslaw Room 625.
Assumed Knowledge
We will assume a basic background of abstract algebra: (primarily abelian) groups, rings, and fields. Students with some background on elementary number theory, or modular arithmetic (the ring Z/NZ) should be able to pick up the relevant concepts along the way.
Background Material
Any standard textbook on abstract algebra (e.g. Fraleigh’s ”A first course in abstract algebra”, Herstein’s ”Abstract algebra”, or chapter one of Lidl and Niederreiter’s ”Finite Fields”) would be useful, but relevant material will be summarised with appendices to the lectures notes. The popular book ”The Codebook” by Simon Singh is recommended as entertaining background reading on the subject.
Resources
Lecture notes and other resources are posted at http://echidna.maths.usyd.edu.au/~kohel/tch/Crypto/.
Course Outline
We begin with an overview of cryptography, including the fundamental concepts of encryption, material on classical ciphers and their cryptanalysis, and distinction between symmetric key and asymmetric (or public) key cryptography. Material on symmetric key cryptography will cover standard block cipher constructions, together with their modes of use, followed by stream ciphers. For the subject of public key cryptography, we recall the construction of the quotient rings Z/NZ and introduce finite fields of any prime power. The main cryptosystems RSA and ElGamal will be introduced, together with the main algorithms for their construction (finding large primality and proving primality) and their cryptanalysis (factoring and discrete logarithm algorithms). We conclude with more “exotic” generalisations of ElGamal cryptosystems to groups of elliptic curves.

Throughout we emphasize an algorithmic approach, and demonstrate the principles with computer experiments and exercises. This will allow us to provide nontrivial examples and discuss algorithmic approaches to construction of large prime numbers, factorization, and ”discrete logarithms”.