Instructor: Adam Smith
Office hours: Tuesday & Thursdays, 4pm-5pm, IST 338K
Date | Syllabus | Reading | Homework |
---|---|---|---|
Tue, Jan 13 | Introduction (slides), Classical Cryptography | KL, Chap. 1 | |
Thu, Jan 15 | Principles of modern crypto. Shannon's definition, one-time pad. | KL, Chap. 1-2. | |
Tue, Jan 20 | Limits of perfect secrecy. Computationally bounded adversaries. | KL, Chap. 2, 3.1 | Homework 1: pdf, tex |
Thu, Jan 22 | Stream ciphers in practive. Blum-Micali-Yao definition. | KL, Chap. 3.3 | |
Tue, Jan 27 | Implications of BMY definition: resistance to statistical tests. Proof that BMY definition implies message indistinguishability of stream ciphers | KL, Chap. 3.2-3.4 | |
Thu, Jan 29 | Finished proof that BMY definition implies message indistinguishability of stream ciphers. One-way functions and "types" of hardness. | KL, Chap. 3.4 | Homework 2 out: pdf, tex |
Tue, Feb 3 | Extending a PRG's output and chosen-plaintext security | KL, Chap. 3.5 | |
Thu, Feb 5 | Detailed hybrid argument. CPA security and pseudorandom functions in counter mode. (slides). | KL, Chap. 3.5-3.6 | |
Tue, February 23 | Constructing pseudorandom functions from pseudorandom generators | ||
Tue, February 24, 8:15pm | Midterm 1 in 109 Walker Building | ||
... | |||
Fri, March 20 | Key distribution and public-key cryptography. Diffie-Hellman key agreement. CDH/DDH assumptions. Quadratic residuosity; proof that DH key agreement leaks parity of the exponent (mod p). El-Gamal public-kyey encryption. | KL, Chap. 9. Chap. | Corrected homework 3 out: pdf, tex |
... | |||
Tue, April 7 | Collision-Resistant Hash Functions: Birthday attack, discrete log-based construction | KL, Chap 4.6 and 7.4.2 | |
Wed, Apr 8 | Midterm 2 in 333 IST at 7:15pm | ||
Thu, April 9 | Signatures: RSA, hashed RSA, Lamport's signatures and extensions. | KL, Chap. 12 | Homework 4 out: pdf, tex |