Course Syllabus
Winter 2019
Optional readings can be found in the textbooks denoted by KL and AC in the syllabus below. The optional AC book, by Boneh and Shoup, is more advanced (and free) and is intended for students wishing to go deeper. The online version of the course is another resource for the material covered in class.
 BonehShoup (AC): (free) A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup
 KL: Introduction to Modern Cryptography (2nd edition) by J. Katz and Y. Lindell.
Syllabus
Lecture 1:
1/ 7/19

Overview of cryptography. What is a cipher?

Basic symmetrickey encryption  
Lecture 2:
1/ 9/19

One time pad and stream ciphers
perfect secrecy and the one time pad.
Reading:
AC ch.3; KL 3.2.13.4.2.
semantic security and stream ciphers. 
Lecture 3:
1/14/19

Block ciphers
Feistel networks and iterated EvenMansour ciphers
Reading:
AC ch. 4.1, 4.2; KL ch 6.16.2.
Case studies: AES and 3DES. 
Lecture 4:
1/16/19

Block cipher abstractions: PRPs and PRFs
[pdf]
Pseudo Random Permutations (PRP); Pseudo Random Functions (PRF);
Reading:
AC. ch. 4.4, 5; KL ch 3.5
security against chosen plaintext attacks (CPA); Modes of operation: CBC and counter mode. 
Holiday: 1/21/19 
MLK: no classes 
Lecture 5:
1/23/19

Attacks on block ciphers
exhaustive search, timespace tradeoffs,
Reading:
AC ch. 4.3; KL ch 3.4.2,3.6
differential & linear cryptanalysis, meet in the middle, side channels. 
Message integrity  
Lecture 6:
1/28/19

Message integrity: definition and applications
CBCMAC and PMAC.
Reading:
AC ch. 6; KL ch 4.14.3

Lecture 7:
1/30/19

Collision resistant hashing
MerkleDamgard and DaviesMeyer. MACs from collision resistance.
Reading:
AC ch. 8.18.9; KL ch 5.15.3
Case studies: SHA and HMAC. 
Lecture 8:
2/ 4/19

Authenticated encryption: security against active attacks
also: intro to session setup using a key distribution center (KDC).
Reading:
AC ch. 9; KL ch 4.5

Public key cryptography  
Lecture 9:
2/ 6/19

Arithmetic modulo primes
Summary of relevant facts: pdf. 
Lecture 10:
2/11/19

Cryptography using arithmetic modulo primes
vanilla key exchange (DiffieHellman);
the CDH and discretelog assumptions
Reading:
AC ch. 10; KL ch 9, 11.4.1

Lecture 11:
2/13/19

Public key encryption
semantically secure ElGamal encryption;
CCA security
Reading:
AC ch. 11; KL ch 9, 11.4.1

Holiday: 2/18/19 
President's day: no classes. 
Lecture 12:
2/20/19

Arithmetic modulo composites
[pdf]
RSA and Rabin functions.
Reading:
AC ch. 10.2, 10.3; KL ch 11.5 how to encrypt with trapdoor permutations. Summary of relevant facts: pdf. 
Digital signatures  
Lecture 13:
2/25/19

Digital signatures: definitions and applications
How to sign using RSA.
Reading:
AC ch. 13; KL ch 12.112.4

Lecture 14:
2/27/19

More signature schemes and applications
[pdf]
Hash based signatures.
Reading:
AC ch. 13.8, ch. 14; KL ch 12.512.8
certificates, certificate transparency, certificate revocation. 
Final topics  
Lecture 15:
3/ 4/19

Identification protocols
[pdf]
Password protocols, salts; one time passwords (S/Key and SecurID);
Reading:
AC ch. 18;
challenge response authentication. 
Lecture 16:
3/ 6/19

Authenticated key exchange and SSL/TLS session setup
[pdf]

Lecture 17:
3/11/19

Zero knowledge protocols

Lecture 18:
3/13/19

Advanced topics. TBD
