Lesson | Subject | Book chapter* |
---|---|---|
1 |
The Context of Cryptography
|
TB1.1 |
2 |
Classical Cryptosystems I
|
TB1.2 |
3 |
Classical Cryptosystems II
|
TB1.2 |
4 |
One Time Pad
|
TB1.2 |
5 |
Cryptographic Attacks
|
Slides |
6 |
Block Ciphers I: Symmetric Cryptography
|
|
7 |
Block Ciphers II: Data Encryption Standard (DES)
|
|
8 |
Block Ciphers III: Triple DES (3DES)
|
|
9 |
Block Ciphers IV: Advanced Encryption Standard (AES)
|
TB1.4
TB2.4 |
10 |
Block Ciphers V: Modes of operation
|
TB2.5 |
11 |
Block Ciphers VI: Attacks
|
Slides |
12 |
Public key cryptography I: Principles and applications
|
TB2.6 |
13 |
Introduction to Number Theory
|
TB1.8
TB1.9 TB1.10 TB2.6 |
14 |
Public key cryptography II The RSA cryptosystem
|
TB1.11
TB2.7 |
15 |
Public key cryptography III: Other PKC systems
|
TB1.13
TB2.8 TB2.9 TB2.10 |
16 |
Public key cryptography IV: RSA attacks I
|
|
17 |
Public key cryptography V: RSA attacks II
|
Slides |
18 |
Hash functions I: Principles and applications
|
TB1.5 |
19 |
Hash functions I: Algorithms
|
|
20 |
Hash functions II: Algorithms
|
|
21 |
Message Authentication Codes
|
TB1.5
TB2.12 |
22 |
Key Managment
|
TB1.6
TB2.13 |
23 |
Applications of Cryptography
|
Slides |
20 |
Quantum mechanics and cryptography
|
Slides |
Book chapters: The course lectures will follow both recommended textbooks, chapters beginning with 1 refer to the textbook "Εισαγωγή στην Κρυπτογραφία" whereas chapters begining with 2 refer to the textbook "Understanding Cryptography, a textbook for students and practitioners".