The course is principally designed around the material in the first three parts (i.e. chapters 1-13) of the main course text, William Stallings's "Cryptography and Network Security: Principles and Practice", Pearson Education (predominantly the 5th ed. 2011, but including some topics from the 6th ed. 2014, not to mention the 7th ed. 2017, and the 4th ed. 2006, is also fine), using many lecture slides prepared by Lawrie Brown (regarding which, I can't express how much I appreciate the fact that these are made available in *editable* form). There is additional material, and further references and comments appear below. N.B. Stallings's book is also a core text for the followup course COMP61421.

Classical encryption techniques.

Rotor machines and Enigma.

Case study: Marian Rejewski

and breaking the German Enigma.

Exercises 1.

Finite fields.

AES.

More on block cyphers.

Exercises 2.

Intro to number theory.

Public-Key cryptography and RSA.

Other public-key cryptosystems.

Exercises 3.

Message authentication codes.

Digital signatures.

Exercises 4.

Quantum cryptography.

Exercises 5.

Exam: 60%, Exercises 1-5: 40%

Practical Hints (.txt) van Tilborg's Cryptology Notebook (Updated) (.nb)

7th ed., Pearson Education; ISBN: 1292158581 (2017)

6th ed., Pearson Education; ISBN: 0273793357 (2014)

5th ed., Pearson Education; ISBN: 013705632X (2011)

(The main course text. Quite detailed and not excessively

mathematical. Lots of worked examples etc. From the 6th edition

on, there are a few additional topics, and the descriptions are

better here and there, but all editions (going back to the 4th)

are good for the course.)

Ferguson N., Schneier B., Kohno T.

*Cryptography Engineering*

John Wiley & Sons; ISBN: 0470474246 (2010)

(An excellent accompaniment to the main text. Though

somewhat less detailed than Stallings, it is written by

some of the world's leading practitioners. The writing has

a riveting style that really tells it like it is with cryptography.)

Paar C., Pelzl J.

*Understanding Cryptography*

Springer; ISBN: 3642041000 (2009)

(A nice compact treatment of the subject. Good

if you want an account that gets to the heart of

the matter without wasting too many words.)

Aumasson J-P.

*Serious Cryptography*

No Starch press; ISBN: 9781593278267 (2018)

(Practically based, but with a perspective informed

by more modern theoretical concepts, it makes for a

good followup to the main text.)

Hoffstein J., Pipher J., Silverman J.

*An Introduction to Mathematical Cryptography*

Springer; ISBN: 9780387779935 (2008)

(Focused on the mathematical aspects of modern

cryptography, it explains the essential concepts

very clearly, without getting too embroiled in the

deeper underlying results. So it's more approachable

than the more hard-headed mathematical texts below.)

=========================================

Salomon D.

*Data Privacy and Security*

Springer N.Y.; ISBN: 0387003118 (2003)

(A very readable book containing a nice treatment of Enigma.)

Singh S.

*The Code Book*

Fourth Estate; ISBN: 1857028791 (1999)

(Really, this is a popular bestseller (which, moreover, has

appeared under many different ISBNs), but it's written so

well that it unquestionably merits inclusion in this booklist.

Has a delightful account of Enigma.)

Bauer C.

*Secret History*

CRC Press; ISNB: 9781466561861 (2013)

(A very readable blend of historical aspects of cryptography

(especially regarding classical techniques) and the essential

technical details. An enjoyable read.)

=========================================

Loepp S., Wooters W.

*Protecting Information: From Classical Error Correcion to
Quantum Cryptography*

Cambridge U.P.; ISBN: 0521534763 (2006)

(This is a fairly short book that includes quite a bit on

quantum theory and a bit on quantum cryptography.)

=========================================

Schneier B.

*Applied Cryptography*

John Wiley & Sons; ISBN: 0471117099 (1996)

(Still an absolute classic. Commenting on key escrow (in 1996!),

it contains the chillingly prophetic: 'Imagine a major terrorist

attack on New York; what sorts of limits on the police would be

thrown aside in the aftermath?' (Page 99 if you're interested.))

=========================================

Delfs H, Knebl H.

*Introduction to Cryptography*

3rd ed., Springer; ISBN: 9783662479735 (2015)

(Mathematical and recently updated, it includes

some quantum cryptography (done without skimping).)

Katz J., Lindell Y.

*Introduction to Modern Cryptography*

2nd ed., Chapman & Hall; ISBN: 9781466570269 (2015)

(A mathematics-first text featuring the modern, complexity

theoretic approach.)

Stinson D., Paterson M.

*Cryptography Theory and Practice*

4th ed., Chapman & Hall; ISBN: 9781138197015 (2019)

(Updated version of a long established mathematics-first

standard text. Much new material in roughly the same space,

so more compressed, and thus a tougher read than the 3rd

edition below.)

Stinson D.

*Cryptography Theory and Practice*

3rd ed., Chapman & Hall; ISBN: 1584885084 (2005)

(A long established mathematics-first standard text.

Less material, therefore less compressed and thus

more readable, than the 4th edition above.)

Mollin R.

*An Introduction to Cryptography*

Chapman and Hall/CRC; ISBN: 1584886188 (2007)

(A mathematics-first introduction to cryptography.)

Pieprzyk J., Hardjono T., Seberry J.

*Fundamentals of Computer Security*

Springer; ISBN: 3540431012 (2003)

(A mathematics-first treatment of cryptography.)

Mao W.

*Modern Cryptography*

Prentice Hall Professional; ISBN: 0130669431 (2004)

(A thorough mathematics-first treatment of cryptography,

and especially of beyond-pure-textbook aspects.)

=========================================

Anderson R.

*Security Engineering* (2nd ed.)

John Wiley & Sons; ISBN: 0470068523 (2008)

(The most highly respected book on the wider issues of

computer security. Some incredible stories. Also contains

a good, if quite brief, account of cryptography.)

Smith R.

*Elementary Information Security* (3rd ed.)

Jones and Bartlett; ISBN: 9781284153040 (2021)

(A very readable and technically not too demanding

treatment of information security in general, designed

to cover the requirements of information security

professionals.)

Workman M., Phelps D., Gathegi J.

*Information Security for Managers*

Jones and Bartlett; ISBN: 9780763793012 (2013)

(Readable and technically not too demanding. Like

a shortened version of Smith's book, but with over

a hundred pages of material specific to governance,

the law, and management. Useful for these aspects.)

Gollman D.

*Computer Security*

John Wiley & Sons; ISBN: 9780470741153 (2011)

(Looking at the wider issue of computer security,

beyond just the concerns of cryptography.)

Newman R.

*Computer Security*

Jones and Bartlett; ISBN: 9780763759940 (2010)

(Considers computer security, but with a much greater

emphasis on the human side than Gollman.)

Maras M-H.

*Computer Forensics*

Jones and Bartlett; ISBN: 97814496600723 (2012)

(Based on American law, so a bit less useful for the UK,

but nevertheless a nice introduction to the main ideas.)

Oriyano S-P.

*Hacker Techniques, Tools, and Incident Handling*

Jones and Bartlett; ISBN: 9781284031713 (2012)

(An introductory text on the main issues involved in

hacking computer systems. Covers the relevant basics.)

Martin K.

*Everyday Cryptography*

Oxford University Press; ISBN: 0199695598 (2012)

(Covers all the topics in the subject, but is quite

light on the mathematical details. Not really enough

to act as a course text for this course.)

Chapple M., Seidl D.

*Cyberwarfare: Information Operations in a Connected World*

Jones and Bartlett; ISBN: 9781284058482 (2015)

(Penetration of secure IT systems, including military systems, is

a major element of international competitiveness in a world where

malware is increasingly sophisticated. The book surveys this rapidly

changing field, and illustrates the account with a large number of

case studies.)

Johnson R.

*Security Policies and Implementation Issues*

Jones and Bartlett; ISBN: 9781284055993 (2015)

(Focused on the role of security policies in organisations,

it covers the relevant issues in reasonable detail.)