Institute of Computer Science
  1. Courses
  2. 2019/20 fall
  3. Cryptology II (MTAT.07.003)
ET
Log in

Cryptology II 2019/20 fall

Previous Years: 2008 » 2009 » 2010 » 2012 » 2014

  • About
  • Lectures
  • Videos
  • GitHub
  • Homeworks
  • Admininistation

Genral instructions

Typeset a short proof similarly to the example provided below

  • Example proof
  • Example LaTeX code

Copy the LaTeX code files into your favourite directory and try to compile it with LaTeX. If this succeeds then modify the corresponding tex file and type in the proof analogously. Send the corresponding LaTeX file together with compiled PDF file to me. In case of problems contact me.

Grading

 HW1HW2HW3SumNominal%Points
Andre Ostrak3.003.00  6.00
Shiting Long2.751.75  6.00
Eric Cornelissen2.252.50  6.00
Risto Pärnapuu2.752.50  6.00

First homework

Deadline: 23th of October 10:15
Boomerang deadline: 30th of October 10:15

  • Solve one exercise for each block
  • Each exercise gives one point
  • You can get an extra point by solvin two exercises from the third block
  • Basic reductions
    • Hardness of least-significant discrete logarithm bit
    • Random self-reducibility of Quadratic Residuosity
  • Statistical properties of distinguishers
    • Region of feasible distinguishers
    • Almost regular hash function as pseudorandom generator
  • Unpredictability and statistical security
    • Hard-core predicate based on Decisional Diffie-Hellman problem
    • Security of hash ElGamal implies Decisional Diffie Hellman
    • Hard-core predicate based on indistinguishability
    • Pseudorandom generator based on hard-core bits of a permutation

Second homework

Deadline: 28th of November 10:15
Boomerang deadline: 5th of December 10:15

  • Solve one exercise for each block
  • Each exercise gives one point
  • Message authentication and keyed hash functions
    • Universal hash followed by pseudorandom function is weakly collision resistant
    • Fixed domain CBC is a pseudorandom function
  • Commitment schemes and hash functions
    • Naor commitments with extended message space
    • Collision resistance of iterative hashing
    • One-wayness of iterative hashing
  • Authentication through challenge-response protocols
    • Existence of signatures implies entity authentication
    • Disjunctive proof of possession is witness indistinguishable

Under construction! Last years system

Optional third homework

Each of you have to choose one exercise from sets {a,b}, {c,d}, {e,f}, i.e., you have to solve three exercises in total. There are no other restrictions for choosing these exercises

Assigmnents

  • Institute of Computer Science
  • Faculty of Science and Technology
  • University of Tartu
In case of technical problems or questions write to:

Contact the course organizers with the organizational and course content questions.
The proprietary copyrights of educational materials belong to the University of Tartu. The use of educational materials is permitted for the purposes and under the conditions provided for in the copyright law for the free use of a work. When using educational materials, the user is obligated to give credit to the author of the educational materials.
The use of educational materials for other purposes is allowed only with the prior written consent of the University of Tartu.
Terms of use for the Courses environment