Arvutiteaduse instituut
  1. Kursused
  2. 2019/20 sügis
  3. Krüptoloogia II (MTAT.07.003)
EN
Logi sisse

Krüptoloogia II 2019/20 sügis

Previous Years: 2008 » 2009 » 2010 » 2012 » 2014

  • About
  • Lectures
  • Videos
  • GitHub
  • Homeworks
  • Admininistation

Genral instructions

Typeset a short proof similarly to the example provided below

  • Example proof
  • Example LaTeX code

Copy the LaTeX code files into your favourite directory and try to compile it with LaTeX. If this succeeds then modify the corresponding tex file and type in the proof analogously. Send the corresponding LaTeX file together with compiled PDF file to me. In case of problems contact me.

Grading

 HW1HW2HW3SumNominal%Points
Andre Ostrak3.003.00  6.00
Shiting Long2.751.75  6.00
Eric Cornelissen2.252.50  6.00
Risto Pärnapuu2.752.50  6.00

First homework

Deadline: 23th of October 10:15
Boomerang deadline: 30th of October 10:15

  • Solve one exercise for each block
  • Each exercise gives one point
  • You can get an extra point by solvin two exercises from the third block
  • Basic reductions
    • Hardness of least-significant discrete logarithm bit
    • Random self-reducibility of Quadratic Residuosity
  • Statistical properties of distinguishers
    • Region of feasible distinguishers
    • Almost regular hash function as pseudorandom generator
  • Unpredictability and statistical security
    • Hard-core predicate based on Decisional Diffie-Hellman problem
    • Security of hash ElGamal implies Decisional Diffie Hellman
    • Hard-core predicate based on indistinguishability
    • Pseudorandom generator based on hard-core bits of a permutation

Second homework

Deadline: 28th of November 10:15
Boomerang deadline: 5th of December 10:15

  • Solve one exercise for each block
  • Each exercise gives one point
  • Message authentication and keyed hash functions
    • Universal hash followed by pseudorandom function is weakly collision resistant
    • Fixed domain CBC is a pseudorandom function
  • Commitment schemes and hash functions
    • Naor commitments with extended message space
    • Collision resistance of iterative hashing
    • One-wayness of iterative hashing
  • Authentication through challenge-response protocols
    • Existence of signatures implies entity authentication
    • Disjunctive proof of possession is witness indistinguishable

Under construction! Last years system

Optional third homework

Each of you have to choose one exercise from sets {a,b}, {c,d}, {e,f}, i.e., you have to solve three exercises in total. There are no other restrictions for choosing these exercises

Assigmnents

  • Arvutiteaduse instituut
  • Loodus- ja täppisteaduste valdkond
  • Tartu Ülikool
Tehniliste probleemide või küsimuste korral kirjuta:

Kursuse sisu ja korralduslike küsimustega pöörduge kursuse korraldajate poole.
Õppematerjalide varalised autoriõigused kuuluvad Tartu Ülikoolile. Õppematerjalide kasutamine on lubatud autoriõiguse seaduses ettenähtud teose vaba kasutamise eesmärkidel ja tingimustel. Õppematerjalide kasutamisel on kasutaja kohustatud viitama õppematerjalide autorile.
Õppematerjalide kasutamine muudel eesmärkidel on lubatud ainult Tartu Ülikooli eelneval kirjalikul nõusolekul.
Courses’i keskkonna kasutustingimused