Computer Science COMP-547B
Cryptography and Data Security

Winter 2017,
Schedule: Monday-Wednesday 10:00-11:30 ENGTR 2110

Instructor: Prof. Claude Crépeau

T.A.: Krtin KUMAR

Office Hours:
Claude : Monday 12:00-15:30, McConnell 110N.
Krtin : Wednesday 12:00-15:00, Trottier 3110.


HW #1 (15 Jan. 2017) (Pdf format) Due Wednesday Feb 1st 2017 23:59

-- HINT sheet (25 sep. 2011) (pdf format)

HW #2 (01 Feb. 2017) (Pdf format) Due Wednesday Feb 15th 2017 23:59


Course Outline (4 Jan 2017)

SLIDES:Course Summary PART I (Lecture 1) (4 Jan. 2017)(Pdf format)

SLIDES: Course Summary PART II (Lecture 2) (9 Jan. 2017) (Pdf format)

SLIDES: Course notes (chap. 1 Number Theory, chap. 2 Finite Fields) (20 Jan. 2017) (Pdf format)

SLIDES: Book (chap. 1 classical cryptography) (UPDATED 16 Feb 2015, 11:00) (Pdf format)

MOVIE: Historical Cryptography ((VERY BIG) AVI format)

SLIDES: Book (chap. 2 perfect security) (UPDATED 6 February 2017, 12:30) (Pdf format)

PAPER: Historical Cryptography: Vernam vs Miller (Pdf format)

———————————— ———————————— BELOW THIS LINE : UPDATE REQUIRED FOR 2017 ———————————— ————————————

SLIDES: Book (chap. 3 Private-Key Encryption) (UPDATED 12 Feb. 2015, 12:00) (Pdf format)

SLIDES: Book (chap. 6 Practical Constructions of Symmetric-Key Primitives) (UPDATED 25 Feb. 2015, 14:00) (Pdf format)

SLIDES: Book (chap. 4 Message Authentication Codes) (UPDATED and fixed terminology to be in sync with 2nd Edition of the book 20 Mar 2015, 19:30) (Pdf format)

SLIDES: Book (chap. 10 Private-Key Management and the Public-Key Revolution) (23 Mar 2015) (Pdf format)

-- Ralph Merkle recounts how he invented public-key cryptography by himself in 1974…

-- Whitfield Diffie recounts the early years of public-key cryptography…

-- James H Ellis recounts the pre-history of public-key cryptography…

SLIDES: Book (chap. 11 Public-Key Encryption) (89 Apr. 2015) (Pdf format)

-- Discrete Log record !

SLIDES: Book (chap. 12 Digital Signature Schemes) (9 Apr. 2015) (Pdf format)

--SHA-3 winner announcement

--SHA-3 Description

SLIDES: Identification (26 Nov. 2011) (Pdf format)

SLIDES: Interactive proofs and Zero-Knowledge (1 Apr. 2014) (Pdf format)

SLIDES: Quantum Computing (1 Apr. 2014) (Pdf format)

SLIDES: Quantum Key Distribution (26 Nov. 2011) (Pdf format)

SLIDES: COURSE REVIEW (11 Apr 2013) (Pdf format)

Send comments/questions to

FINAL EXAM 1999 Ignore Q5.
FINAL EXAM 2000 Ignore Q2.
FINAL EXAM 2001 Ignore Q5 (b) & (c)
FINAL EXAM 2003 Ignore Q5 (c) & (d)
FINAL EXAM 2005 Ignore Q5 (b) & Q6.
FINAL EXAM 2006 Ignore Q1, Q5 & Q6.
FINAL EXAM 2007 Ignore Q1 & Q5.
FINAL EXAM 2008 Ignore Q2.
FINAL EXAM 2010 Ignore Q4.
FINAL EXAM 2011 Ignore Q5 iv).
FINAL EXAM 2013 Ignore Q6.

Description: (4 credits, 3 hours). This course presents an in-depth study of modern cryptography and data security. We investigate four important subjects of cryptography: data encryption, message authentication, user identification and key distribution. The basic information theoretic and computational security of classical and modern cryptographic systems are analysed. The course is self-contained and all necessary mathematical background will be explicitely covered.

Mandatory textbook:
Introduction to Modern Cryptography 2nd Edition , by Jonathan Katz and Yehuda Lindell.  
Chapman and Hall/CRC Press, Nov 2014.


Mandatory use of MAPLE :

Available labs with maple 16 installed : lab2-X, open-X, lab6-X, lab7-X, lab9-X, where X is from 1 to approximately 25.
Any student taking a cs course either has or can create a CS account.

useful books:


Send comments/questions to

Last update 08/01/2015