Logo
Course Syllabus
Winter 2017
Optional reading can be found in three texts listed below. Only one of these books is needed and KL is a good fit for the class. Students opting for a free book can find some of the material in HAC. The third optional book, by Boneh and Shoup, is more advanced (and free) and is intended for students wishing to go deeper.
- KL: Introduction to Modern Cryptography (2nd edition) by J. Katz and Y. Lindell.
- HAC: (free) Handbook of Applied Cryptography by A. Menezes, P. Van Oorschot, S. Vanstone.
- Boneh-Shoup: (free) A Graduate Course in Applied Cryptography by D. Boneh and V. Shoup
Syllabus
Lecture 1:
1/ 9/17
History and overview of cryptography
Reading:
KL ch 1.1-1.3 ; HAC pp 11-20.
Basic symmetric-key encryption
Lecture 2:
1/11/17
One time pad and stream ciphers
perfect secrecy and the one time pad.
semantic security and stream ciphers.
Reading:
KL ch 2, 3.2.1-3.4.2 ; HAC pp 20-21, 191-194.
semantic security and stream ciphers.
Holiday:
1/16/17 MLK: no classes
1/16/17 MLK: no classes
Lecture 3:
1/18/17
Block ciphers
Case studies: Feistel networks, DES, 3DES, and AES.
basic modes of operation: CBC and counter mode.
Reading:
KL ch 6.1-6.2 ; HAC pp 233-237, 250-259
basic modes of operation: CBC and counter mode.
Lecture 4:
1/23/17
Block cipher abstractions: PRPs and PRFs
[pdf]
Pseudo Random Permutations (PRP); Pseudo Random Functions (PRF);
security against chosen plaintext attacks (CPA);
nonce-based CBC encryption and nonce-based counter mode.
Reading:
KL ch 3.5 ; HAC pp 228-230
security against chosen plaintext attacks (CPA);
nonce-based CBC encryption and nonce-based counter mode.
Lecture 5:
1/25/17
Attacks on block ciphers
exhaustive search, time-space tradeoffs,
differential & linear cryptanalysis, meet in the middle, side channels.
Reading:
KL ch 3.4.2,3.6
differential & linear cryptanalysis, meet in the middle, side channels.
Message integrity
Lecture 6:
1/30/17
Message integrity: definition and applications
CBC-MAC and PMAC.
Reading:
KL ch 4.1-4.3
Lecture 7:
2/ 1/17
Collision resistant hashing
Merkle-Damgard and Davies-Meyer. MACs from collision resistance.
Case studies: SHA and HMAC.
Reading:
KL ch 5.1-5.3 ; HAC pp 333-335, 339-341, 348
Case studies: SHA and HMAC.
Lecture 8:
2/ 6/17
Authenticated encryption: security against active attacks
also: intro to session setup using a key distribution center (KDC).
Reading:
KL ch 4.5
Public key cryptography
Lecture 10:
2/13/17
Cryptography using arithmetic modulo primes
vanilla key exchange (Diffie-Hellman);
the CDH and discrete-log assumptions
Reading:
KL ch 9, 11.4.1
Lecture 11:
2/15/17
Public key encryption
semantically secure ElGamal encryption;
CCA security
Reading:
KL ch 9, 11.4.1
Holiday:
2/20/17 President's day: no classes.
2/20/17 President's day: no classes.
Lecture 12:
2/22/17
Arithmetic modulo composites
[pdf]
RSA and Rabin functions.
how to encrypt with trapdoor permutations.
Reading:
KL ch 11.5 how to encrypt with trapdoor permutations.
Summary of relevant facts: pdf.
Digital signatures
Lecture 13:
2/27/17
Digital signatures: definitions and applications
How to sign using RSA.
Reading:
KL ch 12.1-12.4
Lecture 14:
3/ 1/17
More signature schemes and applications
[pdf]
Hash based signatures.
certificates, certificate transparency, certificate revocation.
Reading:
KL ch 12.5-12.8
certificates, certificate transparency, certificate revocation.
Final topics
Lecture 15:
3/ 6/17
Identification protocols
[pdf]
Password protocols, salts; one time passwords (S/Key and SecurID);
challenge response authentication.
Reading:
HAC ch 10.
challenge response authentication.
Lecture 17:
3/13/17
Zero knowledge protocols
Reading:
None.
Lecture 18:
3/15/17
Advanced topics. TBD