Week | Lecture Topic |
Tutorial Topic | Course Work |
9/9 | Introduction and motivation, attack models, symmetric cryptosystems, notions of security |
No tutorial |
Read the course website |
9/16 | Classical ciphers, probability theory, perfect secrecy |
Typesetting with LaTeX; Java Cryptography Architecture; JCA demo program |
|
9/23 | More on perfect secrecy, one-time pad, entropy |
Number theory: modular arithmetic, extended Euclidean algorithm, modular inverses |
Practice LaTeX |
9/30 | Product ciphers, Data Encryption Standard |
Questions on Assignment 1; probability theory, perfect secrecy, entropy |
|
10/7 | Advanced Encryption Standard |
Polynomials over finite fields |
Assignment 1 due (extended: Tue 10/8) |
10/14 | Cryptanalysis of block ciphers, stream ciphers, modes of operation of block ciphers |
Review of solutions to Assignment 1; Java programming with sockets: Saeed's tutorial, E. R. Harold's tutorial |
|
10/21 | Hash functions and message authentication codes |
Questions on Assignment 2, differential and linear cryptanalysis of block ciphers |
Assignment 2 due (Fri 10/25, extended to Mon 10/28) |
10/28 | One-way functions, number theory, the Diffie-Hellman protocol |
Review and practice questions for midterm exam |
|
11/4 | Public key cryptosystems, more number theory, Midterm Exam, RSA |
Review of solutions to Assignment 2; number theory: fast exponentiation, primitive roots modulo p, Euler's phi function, Fermat's and Euler's Theorems |
|
11/11 | Efficiency and security of RSA, probabilistic encryption and ElGamal PKC, Provable security under passive attacks |
Questions on Assignment 3; review of number theory: extended Euclidean algorithm, modular inverses, Euler's phi function, Fermat's and Euler's Theorems, primitive roots modulo p, discrete logarithms, fast exponentiation |
Assignment 3 due (Fri 11/15, extended to Mon 11/18) |
11/18 | Quadratic residuocity, Goldwasser-Micali system, active attacks on RSA, provable security under active attacks, RSA-OAEP |
Number theory: quadratic residues and non-residues, Legendre and Jacobi symbol |
|
11/25 | Digital signatures, signatures from public key cryptosystems, security of signatures, El Gamal signature scheme, Digital Signature Standard |
Questions on Assignment 4; review of solutions to Assignment 3
| |
12/2 | Cryptography in practice: key management and distribution, authentication, cryptographically secure pseudorandom bit generators, secure e-mail via PGP, access control via SSH |
Review and practice questions for final exam |
Assignment 4 due (Fri 12/6) |