(Winter 2022) CS 485/585 - Intro to Cryptography
Schedule (subject to change)
General guideline
- Zoom link for joining lectures remotely, TR 14:00 - 15:50.
Schedule (subject to change)
Week | Date | Topic | Reading & Note |
---|---|---|---|
1 | T,01/04 | Intro | KL 1,A.1-A.3 Note on probability PDF |
R,01/06 | Perfect secrecy | KL 1.4,2.1 | |
2 | T,01/11 | One-time pad and limits | KL 2.2,2.3 |
R,01/13 | Computational secrecy Pseudorandom generators |
KL 3.1 - 3.3 Supplement: KL 7.1 |
|
3 | T,01/18 | Proof by reduction Block ciphers |
KL 3.3,3.5.1 Supplement: KL 7.2, BS 5 |
R,01/20 | Chosen-Plaintext-Attacks | KL 3.4,3.5.2 Supplement: BS 6 |
|
4 | T,01/25 | CPA-secure encryption Message authentication codes |
KL 4.1 - 4.4 |
R,01/27 | DES and AES Modes of operation |
KL 3.6,7.2 Supplement: BS 5.3,6.4,6.5 |
|
5 | T,02/01 | MAC domain extension Hash functions and HMAC |
KL 4.3,6.1-6.4 |
R,02/03 | CCA and authenticated encryption | KL 5.1-5.3 | |
6 | T,02/08 | Private-key primitives: theoretical constructions |
KL 8 |
R,02/10 | Hybrid argument PKC evolution |
KL 8.8,11,12.1,12.2 History of PKC: Diffie, Merkle’s Project Proposal, CESG |
|
7 | T,02/15 | Math review TDP & RSA Diffie-Hellman & ElGamal |
KL 9.1-9.3,12.4,12.5 Note on algebra PDF |
R,02/17 | KEM/DEM Lattice-crypto |
KL 12.3,14.3 Barak’s note PDF Peikert’s tutorial Youtube |
|
8 | T,02/22 | Digital signatures | KL 13.1-13.3 |
R,02/24 | Random-oracle PKC with RO |
KL 6.5,12.5.4,13.4 | |
9 | T,03/01 | TLS (Post-)Quantum cryptography |
KL 13.6,13.7,14 FS’s talk [Slides PDF] [Video] |
R,03/03 | Ethics | Rogaway’s essay: The Moral Character of Cryptographic Work |
|
10 | T,03/08 | Selected topics: zero-knowledge proofs Bitcoin |
|
R,03/10 | Review |