Syllabus
The following is a tentative list of topics that will be
covered. Click on each topic for further details and suggested readings.
Details for later topics will be added and/or updated as the course
progresses.
Feb 2: Overview of Cryptography
Feb 4: Cryptographic Definitions and Semantic Security
Feb 9: Stream Ciphers
Topics (Lecture Notes)
Stream cipher constructions (LCGs, LFSRs, RC4, ChaCha)
Chosen-plaintext security (CPA-security)
References
Feb 11: Block Ciphers
Feb 16: Using Block Ciphers
Feb 18: Constructing Block Ciphers
Topics (Lecture Notes)
Feistel networks and Luby-Rackoff
Iterated Even-Mansour constructions
Block cipher constructions (3DES and AES)
References
Feb 23: Message Integrity
Topics (Lecture Notes)
Message authentication codes (MACs)
MACs from PRFs
Domain extension for PRFs (ECBC, NMAC, CMAC, PMAC)
References
Feb 25: Collision-Resistant Hashing
Topics (Lecture Notes)
Collision resistant hash functions (CRHFs)
Merkle-Damgård construction
Davies-Meyer compression function
References
Mar 2: HMAC and Authenticated Encryption
Mar 4: Authenticated Encryption
Topics (Lecture Notes)
Active attacks and chosen-ciphertext security (CCA-security)
Authenticated encryption with associated data (AEAD)
Carter-Wegman MAC
Galois counter mode (GCM)
References
Mar 9: No Class
Mar 11: Introduction to Prime-Order Groups
Topics (Lecture Notes)
Key distribution (Kerberos)
Diffie-Hellman key exchange
Prime-order groups: definitions and properties
References
Mar 16: The Discrete Logarithm Problem
Topics (Lecture Notes)
Computational problems over prime-order groups
Discrete log, CDH, and DDH
Concrete instantiations of discrete log groups
References
Mar 18: Public-Key Encryption
Mar 23: Introduction to Composite-Order Groups
Mar 25: Public-Key Cryptography from RSA
Topics (Lecture Notes)
Signatures from RSA (RSA-FDH), PKCS1 signatures
Insecurity of textbook RSA
Public-key encryption from RSA
References
Mar 30: Authenticated Key Exchange
Topics (Lecture Notes)
Certificates and the public-key infrastructure (PKI)
Authenticated key-exchange protocols: constructions and attacks
Transport Layer Security (TLS)
References
Apr 1: Identification Protocols
Topics (Lecture Notes)
Identification protocols and threat models
Password storage and management
One-time passwords (SecurID, TOTP, S/Key)
Challenge-response authentication and active security
References
Apr 6: Introduction to Zero-Knowledge
Apr 8: Zero-Knowledge Proofs
Apr 13: Proofs of Knowledge
Apr 15: No Class
Apr 20: Non-Interactive Proofs and ECDSA
Apr 22: Multiparty Computation
Apr 27: Two-Party Computation
Apr 29: Lattices and Learning with Errors
Topics (Lecture Notes)
Introduction to lattice-based cryptography
The learning with errors (LWE) problem
Public-key encryption from LWE
References
May 4: Short Integer Solutions
Topics (Lecture Notes)
The short integer solutions (SIS) problem
Collision-resistant hash functions from SIS
Digital signatures and lattice trapdoors
References
May 6: Lattice-Based Key Exchange
|