course-details-portlet

IMT6041 - Selected Topics in Cryptology

About

Examination arrangement

Examination arrangement: Oral exam and Project work
Grade: Passed/Failed

Evaluation Weighting Duration Grade deviation Examination aids
Project work 1/2
Oral examination 1/2

Course content

-1. Introduction - elements of information theory, symmetric and asymmetric cipher theory

-2. Elements of modern symmetric cipher theory

-3. Modern public key systems

Learning outcome

Knowledge

The candidate possesses knowledge at the most advanced frontier in the field of cryptology. The candidate has mastered academic theory and scientific methods in cryptology. The candidate is capable of considering suitability and use of different methods and processes in research in the field of cryptology. The candidate is capable of contributing to development of new knowledge, theories, methods, interpretations and forms of documentation in cryptology.

Skills

The candidate is capable of formulating problems, planning and completing research projects in cryptology. The candidate is capable of doing research and development at a high international level. The candidate is capable of handling complex academic tasks. The candidate can challenge established knowledge and practice in cryptology.

General competence

The candidate is capable of identifying relevant - and possibly new - ethical problems and exercising research in cryptology with academic integrity. The candidate is capable of managing complex interdisciplinary tasks and projects. The candidate is capable of disseminating the results of research and development in cryptology through approved national and international publication channels. The candidate is capable of taking part in debates in international forums within the field of cryptology. The candidate is capable of considering the need for, taking initiative to and engaging in innovation in the field of cryptology.

Learning methods and activities

-Lectures -Assignments -Project work

Compulsory requirements: None

The course is taught on the individual basis - reading the literature and consulting the teacher.

Further on evaluation

Re-sit / Utfyllende om kontinuasjon: The whole course must be repeated

Assessment forms / Vurderingsformer:

  • Oral exam
  • Project evaluation of one project
  • Both parts must be passed.

Course materials

Books:

-1. Introduction to Cryptography and Coding Theory, 2. edition, Trappe W., Washington L., Prentice Hall, 2006, ISBN: 0131981994.

-2. Handbook of Applied Cryptography, Menezes A., http://www.cacr.math.uwaterloo.ca/hacVarious papers (available on-line)

More on the course

No

Facts

Version: 1
Credits:  5.0 SP
Study level: Doctoral degree level

Coursework

Term no.: 1
Teaching semester:  AUTUMN 2021

Term no.: 1
Teaching semester:  SPRING 2022

Language of instruction: English

Location: Gjøvik

Subject area(s)
  • Informatics
Contact information
Course coordinator:

Department with academic responsibility
Department of Information Security and Communication Technology

Examination

Examination arrangement: Oral exam and Project work

Term Status code Evaluation Weighting Examination aids Date Time Examination system Room *
Autumn ORD Oral examination 1/2
Room Building Number of candidates
Autumn ORD Project work 1/2

Submission
2021-12-20

INSPERA
Room Building Number of candidates
Spring ORD Oral examination 1/2
Room Building Number of candidates
Spring ORD Project work 1/2 INSPERA
Room Building Number of candidates
  • * The location (room) for a written examination is published 3 days before examination date. If more than one room is listed, you will find your room at Studentweb.
Examination

For more information regarding registration for examination and examination procedures, see "Innsida - Exams"

More on examinations at NTNU