READING &
HOMEWORK
ASSIGNMENTS
Assignments are listed here chronologically by due date.
New assignments will tend to be at the bottom of the page.
Jump directly to
Week 1
| Week 2
| Week 3
| Week 4
| Week 5
| Week 6
| Week 7
| Week 8
| Week 9
| Week 10
The author of the textbook maintains a list of
errata.
Week 1: Wednesday
- Reading Assignment for Wednesday of First Week:
- Read the Handout - Section 1.1 from Mollin's An Introduction to
Cryptography.
- Discussion Questions for Wednesday of First Week:
Students should present/discuss the following historical
ciphers:
- Spartan skytale
- Caesar substitution
- Alberti cipher disk
- Porta digraphic cipher
- Cardano grille
- Vigenere autokey cipher
Present solutions to the following exercises
from the reading in Mollin:
- Exercise 1.1
- Exercise 1.3
- Exercise 1.5
- New material for Wednesday of First Week:
Week 1: Friday
Week 2: Monday
- Homework Problems for Monday of Second Week:
- Reading Assignment for Monday of Second Week:
- Read Chapter 2 of Alfred Beutelspacher's Cryptology,
available on GoogleBooks and on Moodle.
- Read Section 4.1 and pp. 108-112 of Section 4.3 of Stallings.
- Discussion Questions for Monday of Second Week:
- (All) Work on decrypting the example in Figure 2.2 of Beutelspacher's
book. Come prepared to discuss difficulties or questions regarding it.
- Problem 4.6
- Problem 4.7
- Problem 4.9.
- Problem 4.11.
Week 2: Wednesday
- Reading Assignment for Wednesday of Second Week:
- Read Appendix G: Simplified DES, available in electronic
form either from the online materials with your book, or on Moodle.
- Discussion Questions for Wednesday of Second Week:
- (All) Attempt to work through SDES with the plaintext input of
10100101 and the key of 0010010111.
Week 2: Thursday
Week 2: Friday
- Reading Assignment for Friday of Second Week:
- Read Secton 3.1 of Stallings.
- Be sure to have read throught the Friedman test in the Beutelspacher
handout.
- Discussion Questions for Friday of Second Week:
- (All) Be ready to discuss the results of the Friedman test on
the example in Beutelspacher's book.
- Test the Avalanche Effect on SDES with the same key as in
Wednesday's discusssion, but with plaintext input of 11100101 (plaintext
from Wednesday, except 2nd bit is flipped).
Week 3: Monday
- Homework Problems for Monday of Third Week:
Part 2 of Homework 1 is due.
- Reading Assignment for Monday of Third Week:
- Read Sections 3.1 - 3.4 of Stallings.
- Begin reading Chapters 1 and 2 of Crypto by Levy.
- Discussion Questions & New Material for Monday of Third Week:
- Explain what an ideal block cipher is.
- Define what diffusion is.
- Define what confusion is.
- Describe the Feistel cipher structure.
- Explain how the first round of decryption works in a Feistel cipher.
- Discuss the overall scheme for DES encryption.
- Discuss the initial permutation of DES.
- Discuss how a single round in DES works.
- Discuss key generation in DES.
- Discuss the Avalanche Effect in DES.
- Discuss the strength of DES.
Week 3: Wednesday
- Reading Assignment for Wednesday of Third Week:
- Read Sections 3.5 and 3.6 of Stallings.
- Read Sections 4.1 - 4.3 of Stallings.
- Discussion Questions for Wednesday of Third Week:
- Last two DQs from Monday of Third Week.
- Discuss a differential cryptanalysis attack on
DES.
- Discuss linear cryptanalysis of DES.
- Discuss the DES design criteria.
- Discuss how the number of rounds is determined in a block cipher design.
- Discuss the design of a function F in a block cipher.
- Discuss the key schedule algorithm in a block cipher
design. What are the strict avalanche criterion and the bit
independence criterion?
Week 3: Friday
- Reading Assignment for Friday of Third Week:
- Read Chapters 1 and 2 of Levy's Crypto.
- Discussion Questions for Friday of Third Week:
- New material for Friday of Third Week:
Homework 2 is now available and is due Friday of 4th week:
- Problem 2.20. (This was supposed to be on HW #1 instead of
#2.18.)
- Problem 3.8.
- Problem 3.11.
- Problem 3.14.
- Problem 3.18.
Week 4: Monday
- Reading Assignment for Monday of Fourth Week:
- Read sections 4.4 and 4.5 of Stallings.
- Read sections 8.1 and 8.2 of Stallings.
- Discussion Questions and New Material for Monday of Fourth Week:
- Assuming a > b, and gcd (a, b) = 1, explain (or write
some code to show how) how the extended euclidean algorithm will allow
us to calculate the inverse of b mod a.
- 4.19(c).
- 4.15(a).
- 4.16.
- 4.17.
- Define what a group is.
- Define ring and field.
- Define the finite field of order p.
- Discuss Fermat's Theorem.
- Define Euler's totient function.
- Explain Euler's Theorem.
Week 4: Wednesday
- Reading Assignment for Wednesday of Fourth Week:
- Read sections 8.3-8.5 of Stallings.
- Discussion Questions for Wednesday of Fourth Week:
- Problem 8.4.
- Problem 8.8.
- Problem 8.9.
- Problem 8.10.
- Problem 8.12.
- Give an example to illustrate the second property of prime
numbers from p. 240.
- Describe the Miller-Rabin Test.
- Problem 8.15.
- Problem 8.16.
- Discuss the Chinese Remainder Theorem.
- Problem 8.18.
- Prove or disprove: If p is a prime and p divides n, then
phi(np) = p * phi(n).
- Describe the discrete log problem.
- Problem 8.21(a).
Week 4: Friday
- Homework Problems for Friday of Fourth Week:
Homework 2 is due. See Friday of Week 3 for the problems.
- Reading Assignment for Friday of Fourth Week:
- Chapters 3 and 4 of Crypto by Levy.
- Discussion Questions for Friday of Fourth Week
- Post two comments or discussion questions on the Moodle forum
for Chapters 3 and 4.
- New Material for Friday of Fourth Week:
Homework 3 is now available and is due Wednesday of 5th Week:
- Problems 4.15(b), 4.19(a).
- Suppose a and b are integers with gcd(a, b) = d. Show that gcd(a/d,
b/d) = 1.
- Problems 8.6, 8.19.
- Show that 1373653 is a strong pseudoprime to the base 3.
Week 5: Monday
- Reading Assignment for Monday of Fifth Week:
- Section 8.5 of Stallings.
- Sections 9.1, 9.2.
- Discussion Questions for Monday of Fifth Week:
- Discuss the powers of an integer, modulo n.
- Describe the discrete log problem.
- Problem 8.21(a).
- Discuss the Pohlig-Hellman Algorithm for computing discrete
logs
- What are the important characteristics of asymmetric
algorithms?
- What are the 6 ingredients of a public-key encryption
scheme?
- Discuss Figure 9.2.
- Discuss Figure 9.3.
- Discuss Figure 9.4.
- Discuss the conditions that Diffie and Hellman laid out
that a public-key system must fulfill.
- Discuss one-way functions and trap-door one-way functions.
- Discuss public-key cryptanalysis.
- Describe the RSA algorithm.
- Show an example of RSA.
Week 5: Wednesday
- Homework Problems for Wednesday of Fifth Week:
The Take-home Midterm will be available today. It will be due
Monday of Sixth Week.
- Reading Assignment for Wednesday of Fifth Week:
- Discussion Questions for Wednesday of Fifth Week:
Continue questions from Monday.
Week 6: Monday
- Reading Assignment for Monday of Sixth Week:
- Finish reading Chapter 9.
- Discussion questions & new material for Monday of Sixth Week:
- Group discussions on security of RSA: the factoring problem, timing
attacks, known ciphertext attacks.
- Rabin public key cryptosystem.
Week 6: Wednesday
- Reading Assignment for Wednesday of Sixth Week:
- Read Sections 10.1, 10.2, 11.1, 11.2 of Stallings.
- Discussion Questions and New Material for Wednesday of Sixth Week:
- This exercise has you encrypt and decrypt using the Elgamal
cryptosystem. Let p = 1777, and choose a generator alpha = 6 of
F_{1777}^{*}. Alice chooses a private key of a = 1009.
Her public key is then (1777, 6, 1729).
- Show how Alice got 1729 as the third component of her public
key.
- Bob wants to encrypt 1483, and chooses a privat enumber b = 701.
Compute the ciphertext Bob sends to Alice.
- Show how Alice obtains the plaintext.
- Suppose n = pq, where p and q are distinct odd primes, and suppose
that the congruence x^{2} = a (mod n), 0 < a < n, has a solution
x = x_{0}. Show that there are exactly four incongruent
solutions mod n.
- New Material for Wednesday of Sixth Week:
Homework 4 is now available and is due Wednesday of Seventh Week:
- Problems 9.1, 9.7, 9.10, 9.13, and 9.18 of Stallings.
Week 6: Friday
- Reading Assignment for Friday of Sixth Week:
- Be sure to have read chapters 5, 6, and 7 of Crypto.
- Discussion Questions and New Material for Friday of Sixth Week:
- Submit at least two comments or questions for discussion
regarding chapters 6, 7, and 8 of Crypto via the discussion
forum on Moodle.
Week 7: Monday
- Reading Assignment for Monday of Seventh Week:
- Discussion Questions for Monday of Seventh Week:
Week 7: Wednesday
- Reading Assignment for Wednesday of Seventh Week:
- Read Sections 11.2, 11.3, 11.5 (pp. 342-349).
- Discussion Questions and New Material for Tuesday of Seventh Week:
- Bring in HW 4 questions.
- Discuss the XOR hash function.
- Discuss the rotated XOR hash function.
- Define the preimage of a hash value and discuss how many preimages
each hash value has.
- Define a collision.
- Discuss the security requirements for cryptographic hash functions.
- Discuss brute force attacks on hash functions.
- Discuss preimage and second preimage attacks.
- Discuss collision resistant attacks.
- Discuss cryptanalysis attacks on hash functions.
Week 8: Monday
- Reading Assignment for Monday of Eighth Week:
- Read Sections 11.5, 13.1, 13.2 of Stallings.
- Continue reading to the end of Crypto (for Friday).
- Discussion Questions and New Material for Monday of Eighth Week:
Week 8: Wednesday
- Reading Assignment for Wednesday of Eighth Week:
- Discussion Questions and New Material for Wednesday of Eighth Week:
Week 8: Friday
- Reading Assignment for Friday of Eighth Week:
- Discussion Questions for Friday of Eighth Week:
EVERYONE must post two comments or questions for discussion on
Moddle, related to the last few chapters of Crypto, or about
the book as a whole.
Week 9: Monday
- Reading Assignment for Monday of Ninth Week:
- Discussion Questions and New Material for Monday of Ninth Week:
- What is A5/1?
- What is GSM?
- What is a linear feedback shift register?
- Give an overview of how A5/1 works.
- Discuss attacks on A5/1.
- Discuss improvements (or successive versions) of A5/1.
- What encryption products are currently in use on cell phones?
Week 9: Wednesday
- Reading Assignment for Wednesday of Ninth Week:
- Discussion Questions for Wednesday of Ninth Week:
At LEAST ONE student needs to do this! (Preferably most of you send
something!)
- Before class (maybe on Tuesday?) Send an email to Ray (raydavidson{at}me{dot}com) with something
you are curious about or want to know more about regarding computer and
information security.
Week 9: Friday
No class. Work on projects!
This page is maintained by Pamela Cutter
(pcutter{at}kzoo{dot}edu).