| Lesson | Subject | Book chapter* |
|---|---|---|
| 1 |
The Context of Cryptography
|
1.1 |
| 2 |
Classical Cryptosystems I
|
1.2 |
| 3 |
Classical Cryptosystems II
|
1.2 |
| 4 |
Cryptographic Attacks
|
1.2.9
2.2.2 |
| 5 |
One Time Pad
|
2.1.3
slides |
| 6 |
Block Ciphers I
|
1.4
2.3 |
| 7 |
Block Ciphers II
|
1.4
2.4 |
| 8 |
Block Ciphers III
|
2.5 |
| 9 |
Block Ciphers IV
|
slides |
| 10 |
Introduction to Number Theory
|
1.8
1.9 1.10 2.6 |
| 11 |
Public key cryptography I
|
2.6 |
| 12 |
Public key cryptography II
|
1.11
2.7 |
| 13 |
Public key cryptography III
|
1.13
2.8 2.9 2.10 |
| 14 |
Public key cryptography IV
|
slides |
| 15 |
Hash functions I
|
1.5 |
| 16 |
Hash functions II
|
slides |
| 17 |
Message Authentication Codes
|
1.5
2.12 |
| 18 |
Key Establishment
|
1.6
2.13 |
Book chapters: The course lectures will follow both recommended textbooks, chapters beginning with 1 refer to the textbook "Εισαγωγή στην Κρυπτογραφία" whereas chapters begining with 2 refer to the textbook "Understanding Cryptography, a textbook for students and practitioners".