School of Computing and Mathematics

Faculty of Natural Sciences

For academic year: 2019/20 Last Updated: 12 November 2019

MAT-30038 - Number Theory and Cryptography

None

MAT-20025 Abstract Algebra.

None.

This module aims to introduce students to Number Theory, which is one of the oldest and most beautiful branches of Pure Mathematics, and also illustrate how some concepts from Number Theory have had unexpected applications to modern problems in cryptography.

evaluate different approaches to linear congruence to determine a full list of solutions, or provide a mathematical proof that none exist: 1,2,

state and prove the Chinese Remainder Theorem, and apply it to solve problems involving systems of simultaneous linear congruences: 1,2,

state the definition of a Primitive Root modulo a natural number, and apply this definition to solve theoretical problems concerning the enumeration and properties of primitive roots: 1,2,

define Quadratic Residues and Legendre Symbols and, by stating, proving and applying suitable theorems, compute Legendre symbols in a variety of cases: 1,2,

explain and evaluate the construction and properties of a variety of ciphers, including symmetric and asymmetric (public key) systems: 1,2,

appraise the strengths and weaknesses of different cryptography systems, and make judgements on appropriate side-channel attacks to attack poorly implemented systems: 1,2,

state and prove the Chinese Remainder Theorem, and apply it to solve problems involving systems of simultaneous linear congruences: 1,2,

state the definition of a Primitive Root modulo a natural number, and apply this definition to solve theoretical problems concerning the enumeration and properties of primitive roots: 1,2,

define Quadratic Residues and Legendre Symbols and, by stating, proving and applying suitable theorems, compute Legendre symbols in a variety of cases: 1,2,

explain and evaluate the construction and properties of a variety of ciphers, including symmetric and asymmetric (public key) systems: 1,2,

appraise the strengths and weaknesses of different cryptography systems, and make judgements on appropriate side-channel attacks to attack poorly implemented systems: 1,2,

Lectures and Examples Classes: 36 Hours

Preparation of Coursework: 24 Hours

Independent Study: 88 Hours

Unseen examination : 2 hours

Preparation of Coursework: 24 Hours

Independent Study: 88 Hours

Unseen examination : 2 hours

None.

2-hour unseen examination

The examination paper will consist of no less than five and not more than eight questions all of which are compulsory.

Continual Assessment

Continuous assessment will consist of written coursework, problem sheets, class tests, or any combination thereof.