Supplementary Information for COMP61411


  • Course plan week by week
  • Course slides
  • General resources
  • Books and comments

    The course is principally designed around the material in the first thirteen chapters of the main course text, William Stallings's "Cryptography and Network Security: Principles and Practice", Pearson Education (see below). The course uses many lecture slides prepared by Lawrie Brown (regarding which, I can't express how much I appreciate the fact that these are made available in *editable* form). These have been edited fairly extensively over the years. There is additional material, and further references and comments appear below. N.B. Stallings's book is also a core text for the followup course COMP61421.

    Course Plan

    Week 1

    Introduction to the main issues.
    Classical encryption techniques.
    Rotor machines and Enigma.
    Case study: Marian Rejewski
    and breaking the German Enigma.

    Exercises 1.

    Week 2

    Block cyphers and DES.
    Finite fields.
    More on block cyphers.

    Exercises 2.

    Week 3

    Stream cyphers.
    Intro to number theory.
    Public-Key cryptography and RSA.
    Other public-key cryptosystems.

    Exercises 3.

    Week 4

    Hash functions.
    Message authentication codes.
    Digital signatures.

    Exercises 4.

    Week 5

    Keywrapping, SHA-3, etc.
    Quantum cryptography.

    Exercises 5.

    Overall Course Assessment:
    See the current syllabus page for
    the Exam/Coursework split.

    Course Slides

    Course Slides (.pdf)

    General Resources

    COMP61411 Exercises (.pdf)        Answer Notebook (.nb)

    Practical Hints (.txt)        van Tilborg's Cryptology Notebook (Updated) (.nb)


    Stallings W.
    Cryptography and Network Security: Principles and Practice
    8th ed., Pearson Education; ISBN: 1292437480 (2022)
    7th ed., Pearson Education; ISBN: 1292158581 (2017)
    6th ed., Pearson Education; ISBN: 0273793357 (2014)
    5th ed., Pearson Education; ISBN: 013705632X (2011)
    (The main course text. Quite detailed and not excessively
    mathematical. Lots of worked examples etc. From the 6th edition
    on, there are a few additional topics, and the descriptions are
    better here and there.)

    Ferguson N., Schneier B., Kohno T.
    Cryptography Engineering
    John Wiley & Sons; ISBN: 0470474246 (2010)
    (An excellent accompaniment to the main text. Though
    somewhat less detailed than Stallings, it is written by
    some of the world's leading practitioners. The writing has
    a riveting style that really tells it like it is with cryptography.)

    Paar C., Pelzl J.
    Understanding Cryptography
    Springer; ISBN: 3642041000 (2009)
    (A nice compact treatment of the subject. Good
    if you want an account that gets to the heart of
    the matter without wasting too many words.)

    Aumasson J-P.
    Serious Cryptography
    No Starch press; ISBN: 9781593278267 (2018)
    (Practically based, but with a perspective informed
    by more modern theoretical concepts, it makes for a
    good followup to the main text.)

    Hoffstein J., Pipher J., Silverman J.
    An Introduction to Mathematical Cryptography
    Springer; ISBN: 9780387779935 (2008)
    (Focused on the mathematical aspects of modern
    cryptography, it explains the essential concepts
    very clearly, without getting too embroiled in the
    deeper underlying results. So it's more approachable
    than the more hard-headed mathematical texts below.)


    Salomon D.
    Data Privacy and Security
    Springer N.Y.; ISBN: 0387003118 (2003)
    (A very readable book containing a nice treatment of Enigma.)

    Singh S.
    The Code Book
    Fourth Estate; ISBN: 1857028791 (1999)
    (Really, this is a popular bestseller (which, moreover, has
    appeared under many different ISBNs), but it's written so
    well that it unquestionably merits inclusion in this booklist.
    Has a delightful account of Enigma.)

    Bauer C.
    Secret History
    CRC Press; ISNB: 9781466561861 (2013)
    (A very readable blend of historical aspects of cryptography
    (especially regarding classical techniques) and the essential
    technical details. An enjoyable read.)


    Loepp S., Wooters W.
    Protecting Information: From Classical Error Correcion to
    Quantum Cryptography

    Cambridge U.P.; ISBN: 0521534763 (2006)
    (This is a fairly short book that includes quite a bit on
    quantum theory and a bit on quantum cryptography.)


    Schneier B.
    Applied Cryptography
    John Wiley & Sons; ISBN: 0471117099 (1996)
    (Still an absolute classic. Commenting on key escrow (in 1996!),
    it contains the chillingly prophetic: 'Imagine a major terrorist
    attack on New York; what sorts of limits on the police would be
    thrown aside in the aftermath?' (Page 99 if you're interested.))


    Katz J., Lindell Y.
    Introduction to Modern Cryptography
    3rd ed., Chapman & Hall; ISBN: 9780815354369 (2021)
    (A mathematics-first text featuring the modern, complexity
    theoretic approach.)

    Smart, N.
    Cryptography Made Simple
    Springer; ISBN: 9783319373096 (2016)
    ('Simple' means only the most complicated proofs have been omitted.
    It features the modern complexity theoretic approach, and discusses
    several more recent topics than usual. Enigma and Lorenz are
    described in full detail. And there are typos etc. sprinked around,
    so read with care.)

    Delfs H, Knebl H.
    Introduction to Cryptography
    3rd ed., Springer; ISBN: 9783662479735 (2015)
    (A mathematics-first text, it includes some
    quantum cryptography (done without skimping).)

    Stinson D., Paterson M.
    Cryptography Theory and Practice
    4th ed., Chapman & Hall; ISBN: 9781138197015 (2019)
    (Updated version of a long established mathematics-first
    standard text. Much new material in roughly the same space,
    so more compressed, and thus a tougher read than the 3rd
    edition below.)

    Stinson D.
    Cryptography Theory and Practice
    3rd ed., Chapman & Hall; ISBN: 1584885084 (2005)
    (A long established mathematics-first standard text.
    Less material, therefore less compressed and thus
    more readable, than the 4th edition above.)

    Mollin R.
    An Introduction to Cryptography
    Chapman and Hall/CRC; ISBN: 1584886188 (2007)
    (A mathematics-first introduction to cryptography.)

    Pieprzyk J., Hardjono T., Seberry J.
    Fundamentals of Computer Security
    Springer; ISBN: 3540431012 (2003)
    (A mathematics-first treatment of cryptography.)

    Mao W.
    Modern Cryptography
    Prentice Hall Professional; ISBN: 0130669431 (2004)
    (A thorough mathematics-first treatment of cryptography,
    and especially of beyond-pure-textbook aspects.)

    Padhye S., Sahu R., Saraswat V.
    Introduction to Cryptography
    CRC Press; ISBN: 1138071536 (2021)
    (A short book, covering the mathematical essentials. Some
    of the text contradicts itself, but the mathematics is fine.)


    Anderson R.
    Security Engineering (2nd ed.)
    John Wiley & Sons; ISBN: 0470068523 (2008)
    (The most highly respected book on the wider issues of
    computer security. Some incredible stories. Also contains
    a good, if quite brief, account of cryptography.)

    Smith R.
    Elementary Information Security (3rd ed.)
    Jones and Bartlett; ISBN: 9781284153040 (2021)
    (A very readable and technically not too demanding
    treatment of information security in general, designed
    to cover the requirements of information security

    Workman M., Phelps D., Gathegi J.
    Information Security for Managers
    Jones and Bartlett; ISBN: 9780763793012 (2013)
    (Readable and technically not too demanding. Like
    a shortened version of Smith's book, but with over
    a hundred pages of material specific to governance,
    the law, and management. Useful for these aspects.)

    Gollman D.
    Computer Security
    John Wiley & Sons; ISBN: 9780470741153 (2011)
    (Looking at the wider issue of computer security,
    beyond just the concerns of cryptography.)

    Newman R.
    Computer Security
    Jones and Bartlett; ISBN: 9780763759940 (2010)
    (Considers computer security, but with a much greater
    emphasis on the human side than Gollman.)

    Maras M-H.
    Computer Forensics
    Jones and Bartlett; ISBN: 97814496600723 (2012)
    (Based on American law, so a bit less useful for the UK,
    but nevertheless a nice introduction to the main ideas.)

    Oriyano S-P.
    Hacker Techniques, Tools, and Incident Handling
    Jones and Bartlett; ISBN: 9781284031713 (2012)
    (An introductory text on the main issues involved in
    hacking computer systems. Covers the relevant basics.)

    Martin K.
    Everyday Cryptography
    Oxford University Press; ISBN: 0199695598 (2012)
    (Covers all the topics in the subject, but is quite
    light on the mathematical details. Not really enough
    to act as a course text for this course.)

    Chapple M., Seidl D.
    Cyberwarfare: Information Operations in a Connected World
    Jones and Bartlett; ISBN: 9781284058482 (2015)
    (Penetration of secure IT systems, including military systems, is
    a major element of international competitiveness in a world where
    malware is increasingly sophisticated. The book surveys this rapidly
    changing field, and illustrates the account with a large number of
    case studies.)

    Johnson R.
    Security Policies and Implementation Issues
    Jones and Bartlett; ISBN: 9781284055993 (2015)
    (Focused on the role of security policies in organisations,
    it covers the relevant issues in reasonable detail.)