Practical Cryptology

CSCI 391: Practical Cryptology Fall 2010

Course Material, Lecture Activities, Homework and Labs

Public Key Cryptology


Inroduction
RSA - Theory and Practice
Andrew's Program to Find Multiplicative Inverse
Knapsack Cryptosystem - Theory and Final Project Description

Computer Ethics HOMEWORK


ACM CODE OF ETHICS HOMEWORK

Computer Ethics - Lecture


Introduction to Computer Ethics, text: Ethics in Information Technology, George Reynolds
Introduction to Computer Ethics: Privacy, text: Ethics in Information Technology, George Reynolds

Computer Ethics Team Assignment

List of the Teams and Links to the papers


Lecture: Cryptanalysis of Affine Cipher


Vigenere Cipher

Hill Cipher


Hill Cipher

Quiz 1 Preparation and Info


Quiz 1 Prep

Java Applet to find modular multiplicative inverse - written by Andrew Burns

QUIZ 1

Home Quiz

  • Due Day 4:00 PM, Wed, October 20, 2010
  • Submission: send your answers by e-mail to CSCI391@gmail.com

    HILL CIPHER LAB PROGRAMMING ASSIGNMENT

    For lab description see here

    Time Table:
    • You will start to work on Monday, Oct 11 and will continue through Friday, Oct 15
    • The due day: Friday, October 15 - in class

HILL CIPHER CRYPTANALYSIS

Example and Theory

In Class Practice

    Problem 1: The ciphertext ZWSENIUSPLJVEU was obtained by Hill Cipher using 2x2 matrix. You know that the block ZW corresponds to the plain text HO and the block PL corresponds to the plain text UT. Determine the key matrix and then use it to decipher the rest of the message.

    Problem 2:The following plaintext THE GOLD IS BURIED IN ORONO was encrypted by Hill Cipher with 2X2 key matrix and the correspondent ciphertext is GZSCXNVCDJZXEOVCRCLSRC. Find a key matrix.

HILL CIPHER CRYPTANALYSIS Quiz - Wed, October 27, 2010 - IN CLASS

HILL CIPHER CRYPTANALYSIS PROGRAMMING LAB - Due Day Wed, Nov 3, 2010

For the detailed lab description click HERE