|
Unit |
Week |
Date |
Topic |
Readings |
|
Introduction |
1 |
Tue 01/10 |
Course outline (syllabus, grading,
policies) Course overview and history of cryptography |
[KL] Chapter 1 |
|
Perfect security |
Thu 01/12 |
Probability overview Perfectly secret cryptography |
[KL]
Chapter 2 |
|
|
Symmetric-key primitives |
2 |
Tue 01/17 |
Computational security Definition of secure encryption Pseudorandom generators |
[KL] Chapters 3.1 - 3.2 |
|
|
Thu 01/19 |
Reduction proofs Construction of computationally secure encryption from PRG |
[KL] Chapter 3.3 HW1 assigned |
|
|
|
3 |
Tue 01/24 |
Constructions and attacks on stream ciphers Pseudorandom functions |
[KL] Chapters 6.1 and 3.5 |
|
Thu 01/26 |
Pseudorandom permutations and CPA-secure encryption |
[KL] Chapters 3.4 and 3.5 |
||
|
|
4 |
Tue 01/31 |
Principles for designing block ciphers. Block ciphers – DES and AES |
[KL] Chapter 6.2 HW1 due |
|
Thu 02/02 |
Modes of operation for block ciphers. Padding-oracle attacks on CBC encryption. |
[KL] Chapters 3.6 and 3.7 Project 1 |
||
|
|
5 |
Tue 02/07 |
Class canceled |
|
|
|
Thu 02/09 |
School closed |
|
|
|
|
6 |
Tue 02/14 |
Message Authentication Codes. |
[KL]
Chapter 4.1-4.4 Project 1 due 02/13 HW2 |
|
Hash functions |
Thu 02/16 |
Authenticated encryption. Cryptographic hash
functions. |
[KL] Chapters 4.5, 5.1, and 5.2 |
|
|
|
7 |
Tue 02/21 |
Hash functions, attacks, Merkle trees. |
[KL] Chapters 5.3 and 5.4 |
|
Public-key cryptography |
Thu 02/23 |
Number theory basics. Primality testing |
[KL]
Chapter 8 HW2 due |
|
|
|
8 |
Tue 02/28 |
Key exchange (Diffie-Hellman, Needham-Schroeder). |
[KL] Chapter 10 |
|
|
Thu 03/02 |
Midterm exam |
|
|
|
Spring break |
|
Tue 03/07 |
No class |
|
|
|
Thu 03/09 |
No class |
|
|
|
Public-key cryptography |
9 |
Tue 03/14 |
School closed |
HW3 |
|
|
Thu 03/16 |
Public-key encryption. Trapdoor permutations. RSA encryption. |
[KL 11.1,11.2, 11.5] |
|
|
10 |
Tue 03/21 |
Attacks against RSA. Discrete log-based encryption. El-Gamal cryptosystem. |
[KL 11.4,12.1-12.4] Project 2 |
|
|
Applications |
Thu 03/23 |
Digital signatures (definition and RSA Full-Domain Hash construction) PKI; Certification Authorities; |
HW3 due |
|
|
|
11 |
Tue 03/28 |
SSL/TLS and HTTPS User authentication; one-time passwords; challenge-response protocols |
|
|
|
Thu 03/30 |
Crypto currencies |
J. Bonneau et al. SoK:
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies Project 2 due 03/31 HW 4 out on 03/31 |
|
|
|
12 |
Tue 04/04 |
Class canceled |
|
|
|
|
Thu 04/06 |
Cloud security using trusted hardware |
Lecture by Amirali Sanatinia |
|
|
13 |
Tue 04/11 |
Crypto currencies |
HW4 due 04/10 – submissions
accepted until 04/13 Project 3 04/11 |
|
|
|
Thu 04/13 |
Anonymity in Bitcoin, zero-knowledge proofs; commitments |
I. Miers et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin |
|
|
14 |
Tue 04/18 |
Secure two-party computation; oblivious transfer; Yao’s garbled circuits; homomorphic encryption |
|
|
|
|
Thu 04/20 |
Review and prepare for final exam |
|
|
|
|
Fri 04/21 |
Final exam; 3:30-5:30pm; Ell Hall 311 |
Project 3 due 04/26 |
US