The course evaluation has now been completed, unfortunately only 7 replies but you find it here. There is also a course analysis (in Swedish).
res checkin krypto05
course join krypto05
If you do not do this your results cannot be reported and you will miss vital information related to the course.
Lecture notes notes from the lecture on pseudorandom number generators has been (also as pdf).
A lecture given by Mats Näslund from Ericsson on February 23. It is a power point presentation.
The course PM, also as pdf.
A description of the G-writer, also as pdf.
Third homework, also as pdf.
External files for homework3 : unknown3, unknown4, ser1, ser2, ser3, ser4, ser5
Second homework, also as pdf.
First homework, also as pdf.
External files for homework1 : unknown1, unknown2, gskriv, gskriv2, SubByte.
Instructions on how to turn in AES programs can be found here. We do have an example of the files plain and cipher (also available in a zip-file) with the key given in the statement of homework 1. The format is a raw binary file. It is easy to find other examples on the net.
The homework sets are supposed to be challenging, and even getting a passing grade (the grade 3) will require some effort. Keep in mind however that you do not have to solve all the problems even to get a good grade. The idea is that it is better to solve some of the problems well than to solve all the problems partially, and solutions will be graded with this in mind.
There will be three sets of homework which will be due on February 4, 18 and March 4 respectively.
Please note the rules that apply to the homework. Be sure to read both the homework rules and the code of honors before you start working on the problems!
As a first alternative, there is "Menezes et al.: Handbook of applied cryptography". This book is available electronically. Visit its homepage. Study the copyright notice. Note that, regardless of the copyright notice, you may not use a printer at KTH to print out a copy of this book.
As a second alternative there is the old course book by Douglas Stinson: Cryptography, Theory and Practice, Chapman & Hall /CRC.
For the student interested in more details and depth about the theoretical foundations of cryptography we recommend Foundations of Cryptography by Oded Goldreich.