Cryptography - 2024 entry
MODULE TITLE | Cryptography | CREDIT VALUE | 15 |
---|---|---|---|
MODULE CODE | MTH3026 | MODULE CONVENER | Dr Gihan Marasingha (Coordinator) |
DURATION: TERM | 1 | 2 | 3 |
---|---|---|---|
DURATION: WEEKS | 0 | 11 weeks | 0 |
Number of Students Taking Module (anticipated) | 116 |
---|
Cryptography is the mathematical art and science of maintaining information security. In this module, you will learn practical algorithms for encrypting plain messages into secret messages. These algorithms ranges from the simple ciphers used in ancient Rome to the sophisticated modern ciphers that secure worldwide banking transactions and diplomatic communications.
You will study two broad classes of cryptosystems: symmetric and asymmetric. Modern symmetric ciphers such as AES (the Advanced Encryption Standard) have their mathematical basis in linear algebra and field theory, whereas asymmetric ciphers such as RSA and ElGamal are founded on number theory and group theory.
Knowing how to crack asymmetric cryptosystems requires developing methods for factorising large numbers and testing numbers for primality. These methods are at the heart of modern attempts to break secret codes.
The module concludes with an introduction to elliptic curve cryptography, a topic with connections to Algebraic Curves (MTHM029).
You will be given a brief introduction to the computer programming language Python in the particular context of solving cryptographic problems.
Prerequisite module: MTH3004.
The aim of this module is to apply number theory, linear algebra, and field theory to problems in the real world where it is important to transmit information securely. For example, cryptography is used in banking, and is traditionally applied in military science.
On successful completion of this module, you should be able to:
Module Specific Skills and Knowledge:
1 formulate encryption as a mathematical problem;
2 define and be able to determine the complexity of algorithms using the Landau notation;
3 describe and apply the principles of block ciphers with particular examples including the Vigenère, affine, and Hill cipher;
4 describe and apply the field theoretic underpinnings of the AES cryptosystem;
5 demonstrate an understanding of the principles of asymmetric key cryptography;
6 describe, apply and prove theorems concerning with asymmetric key algorithms such as Diffie-Hellman key exchange, the ElGamal PKC and the RSA PKC;
7 describe the discrete logarithm problem;
8 describe, apply and prove theorems concerning methods for the solution of discrete logarithm problems including: the baby-step, giant-step algorithm, the Pohlig-Hellman algorithm;
9 describe, apply and prove theorems concerning factorisation methods, including Fermat factorisation, Pollard’s p-1 method, Pollard’s rho method, and Lenstra’s elliptic curve method;
10 describe, apply and prove theorems concerning primality testing methods, including the Fermat and Miller-Rabin primality tests;
11 understand the principles of digital signatures;
12 describe, apply, and prove theorems concerning digital signature algorithms including the ElGamal and RSA digital signature schemes;
13 describe the arithmetic of elliptic curves and demonstrate an understanding of elliptic curve cryptography;
14 describe classes of cryptographic attack (including known plaintext attack, adaptive chosen ciphertext attack, etc.) and determine whether a given cryptosystem is vulnerable to a particular class of attack;
15 perform sophisticated cryptographic computations, either by hand or using Python and the Jupyter notebook interface.
Discipline Specific Skills and Knowledge:
16 appreciate how to apply number theory, linear algebra, field theory, and group theory to real-world problems;
17 prove theorems concerning the effectiveness and complexity of algorithms.
Personal and Key Transferable/ Employment Skills and Knowledge:
18 show an appreciation of how concrete problems typically require abstract theories for their solution;
19 display an ability to analyse algorithms.
- introduction to cryptography, history of cryptography; symmetric and asymmetric cryptosystems; some simple examples;
- block ciphers (Vigenère, affine, Hill); block cipher modes of operation (ECB, CBC);
- constructing finite fields and the AES (Advanced Encryption Standard);
- complexity of algorithms;
- Diffie-Hellman key exchange; the ElGamal PKC (public key cryptosystem);
- cryptanalysis of discrete logarithm-based problems – Shank’s baby-step, giant-step and the Pohlig-Hellman algorithm;
- the RSA cryptosystem;
- trial division and Fermat factorisation;
- other factorisation methods: Pollard’s p-1 method, Pollard’s rho method;
- primality testing: Fermat and Miller-Rabin primality tests;
- authentication: ElGamal and RSA digital signature schemes;
- the unit circle group;
- the elliptic curve group; elliptic curve Diffie-Hellman; Lenstra’s elliptic curve method for integer factorisation.
Scheduled Learning & Teaching Activities | 33 | Guided Independent Study | 117 | Placement / Study Abroad | 0 |
---|
Category | Hours of study time | Description |
Scheduled learning and teaching activities | 33 | Lectures/example classes |
Guided independent study | 117 | Lecture and assessment preparation; private study |
Form of Assessment | Size of Assessment (e.g. duration/length) | ILOs Assessed | Feedback Method |
---|---|---|---|
Example sheets | 4 x 10 hours | All | Solutions made available through ELE |
Coursework | 20 | Written Exams | 80 | Practical Exams | 0 |
---|
Form of Assessment | % of Credit | Size of Assessment (e.g. duration/length) | ILOs Assessed | Feedback Method |
---|---|---|---|---|
Coursework 1- based on questions submitted for assessment | 10 | 15 hours | All | Annotated script and written/verbal feedback |
Coursework 2- based on questions submitted for assessment | 10 | 15 hours | All | Annotated script and written/verbal feedback |
Written Exam – closed book | 80 | 2 hours (Summer) | All | Written/verbal on request, SRS |
Original Form of Assessment | Form of Re-assessment | ILOs Re-assessed | Time Scale for Re-reassessment |
---|---|---|---|
Written Exam * | Written Exam (2 hours) | All | August Ref/Def period |
Coursework 1 * | Coursework 1 | All | August Ref/Def period |
Coursework 2 * | Coursework 2 | All | August Ref/Def period |
*Please refer to reassessment notes for details on deferral vs. Referral reassessment
Deferrals: Reassessment will be by coursework and/or written exam in the deferred element only. For deferred candidates, the module mark will be uncapped.
Referrals: Reassessment will be by a single written exam worth 100% of the module only. As it is a referral, the mark will be capped at 40%.
information that you are expected to consult. Further guidance will be provided by the Module Convener
ELE – http://vle.exeter.ac.uk
Reading list for this module:
Type | Author | Title | Edition | Publisher | Year | ISBN |
---|---|---|---|---|---|---|
Set | Hoffstein, J., Pipher, J. & Silverman, J.H. | An introduction to mathematical cryptography | 2nd | Springer | 2014 | 978-1493917105 |
Set | Koblitz, Neal | A course in Number theory and Cryptography | Graduate Text in Mathematics | Springer | 1994 | |
Set | Buchmann, J | Introduction to Cryptography | 2nd | Springer | 2004 | 978-0387207568 |
CREDIT VALUE | 15 | ECTS VALUE | 7.5 |
---|---|---|---|
PRE-REQUISITE MODULES | MTH3004 |
---|---|
CO-REQUISITE MODULES |
NQF LEVEL (FHEQ) | 6 | AVAILABLE AS DISTANCE LEARNING | No |
---|---|---|---|
ORIGIN DATE | Tuesday 12th March 2024 | LAST REVISION DATE | Tuesday 12th March 2024 |
KEY WORDS SEARCH | Fermat's little theorem; Miller-Rabin test; cryptosystems (symmetric cryptosystems and public key cryptosystems); encryption; decryption; RSA - and related cryptosystems; discrete logarithmic problems. |
---|
Please note that all modules are subject to change, please get in touch if you have any questions about this module.