This is a tentative schedule meant to give
an overview of the topics we are going to cover. It will be expanded as we proceed through the quarter.
Wk | Date | Lecture contents |
Materials, Sections, and Homework |
0 | 09/27 |
Introduction
Welcome / organizational details
What is this class about? Why study cryptography?
The Provable Security Angle
|
|
| 09/29 |
Introduction to Encryption
Syntax of symmetric encryption
Attack types: Ciphertext only, known- and chosen-plaintext
Substituion cipher, and its insecurity
|
|
1 | 10/2 |
One-time Pad and Perfect Secrecy
Perfect secrecy and Shannon secrecy
One-time pad
Necessity of long keys
Motivation for computationl security
|
|
| 10/4 |
Block Ciphers and Pseudorandom Permutations I
Block ciphers
Oracles and indistinguishability
|
|
| 10/6 |
Block ciphers and Pseudorandom Permutations II
Definition of pseudorandom permutation security
Calculating distinguishing advantages
Feasibility and negligibility: Concrete vs asymptotic security
|
|
2 | 10/9 |
Symmetric Encryption I
Block ciphers constructions
ECB and its insecurity
Introduction to semantic security
|
|
| 10/11 |
Symmetric Encryption II
IND-CPA security
Counter-Mode Encryption
Pseudorandom Functions
|
|
| 10/13 |
Symmetric Encryption III
Proof of IND-CPA security for randomized counter mode
Hybrid arguments
Simple oracle reductions
Equivalent-until-bad arguments
|
|
3 | 10/16 |
Modes of Operations and Active Attacks
A note on asymptotic interpretation of results
Counter-mode and CBC-mode
Introduction to Padding Oracles
|
|
| 10/18 |
Padding-Oracle Attacks
Padding-Oracle Setting
Recovering the last byte
Introduction to integrity
|
|
| 10/20 |
Hash Functions
Definition and applications of hash functions
Collision resistance, 2nd preimage resistance
General oracle definitional framework
Birthday Attacks
|
|
4 | 10/23 |
Hash Functions
More applications of hash functions
The Merkle-Damgard construction
|
|
| 10/25 |
Message Authentication Codes
MAC syntax and UF-CMA security
PRFs are good MACs
Hash-based vs Block-cipher based MACs
|
|
| 10/27 |
Authenticated Encryption
Ciphertext & Plaintext Integrity
Encrypt-then-MAC vs MAC-then-Encrypt
Brief intro to side-channel attacks
|
|
5 | 10/30 |
Computational Number Theory I
Groups
Modular arithmetic
Modular exponentiation
|
|
| 11/1 |
Midterm Exam
Time/Location: 11:30-12:20p, MOR 230 (regular class time and location)
A review session will be scheduled
|
|
| 11/3 |
Computational Number Theory II
Exponentiation in groups
Cyclic Groups
Discrete Logarithms
|
|
6 | 11/6 |
Key Exchange and Diffie Hellman
Diffie-Hellman Key Exchange
The DL, CDH, and DDH assumptions
Groups where DL/CDH/DDH are hard
|
|
| 11/8 |
Elliptic Curves
Elliptic Curves
Intro to Public-Key Encryption
|
|
| 11/10 |
Veterans day (No class)
|
|
7 | 11/13 |
Public-key Encryption and RSA
Definition of public-key encryption and its security
Equivalence with Key Exchange
Introduction to RSA
|
|
| 11/15 |
RSA & Factoring
Plain RSA and the RSA assumption
Padding for RSA
CCA security and RSA-OAEP
Hardness of factoring
|
|
| 11/17 |
Digital Signatures
RSA attacks
Definition of digital signatures
RSA signatures
|
|
8 | 11/20 |
Digital Certificates
Full-Domain Hash and Schnorr Signatures
Person-in-the-middle attacks
Introduction to digital certificates and PKIs
|
|
| 11/22 |
Thanksgiving (no class) |
|
| 11/24 |
Thanksgiving (no class)
|
|
9 | 11/27 |
Authenticatd Key-Exchange & TLS
Authenticated Key Exchange
Forward Secrecy
Hierarchical PKIs
|
|
| 11/29 |
Multi-Party Computation I
Problem setting and security definitions
Securely computing the AND Gate
Oblivious Transfer
|
|
| 12/1 |
Multi-Party Computation II
Garbled Circuits and Yao's protocol
Dedicated protocol for Private-Set Intersection
|
|
10 | 12/4 |
Multi-Party Computation III
General definition of Multi-Party Computation
Linear secret sharing schemes
Multiplication protocol
|
|
| 12/6 |
Ethics, Policy & Cryptography
|
|
| 12/8 |
Review & Discussion
On cryptographic thinking
What else is there, and where to find it?
|
|
Fin |
12/13 |
Final Exam
Time/Location: 2:30-4:20p, MOR 230
An exam review session will be scheduled earlier during finals week
|
|