IMT6081 - Modern Cryptology


Examination arrangement

Examination arrangement: Oral exam and Project Work
Grade: Passed/Failed

Evaluation Weighting Duration Grade deviation Examination aids
Project Work 1/2
Oral examination 1/2

Course content

Introduction - elements of information theory, general cipher system theory  Contemporary theory of randomness - randomness and indistinguishability  Elements of modern symmetric ciphers theory - Galois fields, primitive polynomials, Boolean functions theory, block ciphers theory, hash functions theory  Public key cryptography - RSA theory, digital signatures

Learning outcome

Knowledge -The candidate possesses knowledge at the most advanced frontier in the field of cryptology. The candidate has mastered academic theory and scientific methods in cryptology. -The candidate is capable of considering suitability and use of different methods and processes in research in the field of cryptology. -The candidate is capable of contributing to development of new knowledge, theories, methods, interpretations and forms of documentation in cryptology.

Skills -The candidate is capable of formulating problems, planning and completing research projects in cryptology. -The candidate is capable of doing research and development at a high international level. -The candidate is capable of handling complex academic tasks. The candidate can challenge established knowledge and practice in cryptology.

General competence -The candidate is capable of identifying relevant - and possibly new - ethical problems and exercising research in cryptology with academic integrity. -The candidate is capable of managing complex interdisciplinary tasks and projects. -The candidate is capable of disseminating the results of research and development in cryptology through approved national and international publication channels. -The candidate is capable of taking part in debates in international forums within the field of cryptology. -The candidate is capable of considering the need for, taking initiative to and engaging in innovation in the field of cryptology.

Learning methods and activities

-Lectures -Project work -Tasks

Compulsory requirements: None

The course is taught on the individual basis - reading the literature and consulting the teacher.

Further on evaluation

Re-sit: The whole course must be repeated.

Forms of assessment: -Oral exam -Project evaluation of one project -Both parts must be passed.

Course materials


  1. Introduction to Cryptography and Coding Theory, 2. edition, Trappe W., Washington L., Prentice Hall, 2006, ISBN: 0131981994.  
  2. Handbook of Applied Cryptography, Menezes A., 
  3. Introduction to modern cryptography, Katz J., Lindell Y., Chapman&Hall/CRC, 2008, ISBN: 1-58488-551-
  4. Various papers (available on-line)

More on the course



Version: 1
Credits:  5.0 SP
Study level: Doctoral degree level


Term no.: 1
Teaching semester:  AUTUMN 2021

Language of instruction: English

Location: Gjøvik

Subject area(s)
  • Informatics
Contact information
Course coordinator:

Department with academic responsibility
Department of Information Security and Communication Technology


Examination arrangement: Oral exam and Project Work

Term Status code Evaluation Weighting Examination aids Date Time Examination system Room *
Autumn ORD Oral examination 1/2 2021-12-10 13:00
Room Building Number of candidates
Autumn ORD Project Work 1/2





Room Building Number of candidates
  • * The location (room) for a written examination is published 3 days before examination date. If more than one room is listed, you will find your room at Studentweb.

For more information regarding registration for examination and examination procedures, see "Innsida - Exams"

More on examinations at NTNU