10/2 | What is cryptography; Historic ciphers; definitions of encryption |
10/6 | Information Theoretic Encryption/Perfect Security |
10/9 | Symmetric Key Encryption: Computational Security, Definitions, Indistinguishability, Reductions |
10/13 | Pseudorandomness: definition of pseudorandom generator (PRG), constructing CPA secure encryption from a PRG |
10/16 | Pseudo-random functions: definitions, Encryption: modes of operation |
10/20 | MACS: definitions, fixed length MAC |
10/23 | Hash functions: definitions, NMAC, HMAC, CCA-secure encryption |
10/27 10/28 | Definitions of one way functions (OWFs), trapdoor permutations(TDPs), Number Theory: discrete log, Diffie-Hellman |
11/3 | Key Exchange |
11/6 | Public Key Encryption: definitions, construction from TDPs, hybrid encryption |
11/10 | RSA, how not to use it |
11/13 | El Gamal, CCA security definition |
11/17 | Signatures: Definitions, RSA, Hash + Sign |
11/20 | Random Oracle Model: what is it, pros and cons, RSA-FDH |
11/24 | Random Oracle Model: Encryption |
12/1 | Advanced Topics |
12/4 | Advanced topics |
12/8 | Advanced topics |
12/11 | Advanced topics |