(Winter 2024) CS 485/585 - Intro to Cryptography
Schedule (subject to change)
Schedule (subject to change)
Week | Date | Topic | Reading & Note |
---|---|---|---|
1 | M,01/08 | Intro | KL 1,A.1-A.3 |
W,01/10 | Perfect secrecy | KL 1.4,2.1 Note on probability PDF |
|
2 | M,01/15 | MLK day | |
W,01/17 | One-time pad | KL 2.2,2.3 | |
3 | M,01/22 | Limits of perfect secrecy Computational secrecy |
KL 2.3,3.1,3.2 |
W,01/24 | Pseudorandom generators Proof by reduction |
KL 3.3 Supplement: KL 7.1 |
|
4 | M,01/29 | Block ciphers | KL 3.5.1 Supplement: KL 7.2, BS 4 |
W,01/31 | Chosen-Plaintext-Attacks | KL 3.4,3.5 Supplement: BS 5 |
|
5 | M,02/05 | CPA security from PRFs Data integrity |
KL 3.5,4.1,4.2 |
W,02/07 | MAC construction Block cipher constructions |
KL 4.3,4.4,7.2 Supplement: BS 4.2 |
|
6 | M,02/12 | Domain extension | KL 3.6,4.3,4.4 Supplement: BS 6.4,6.5 |
W,02/14 | Hash functions | KL 6.1,6.2,6.4,7.3 | |
7 | M,02/19 | HMAC CCA & Authenticated encryption |
KL 6.3,5.1-5.3 |
W,02/21 | PKC evolution | KL 11,12.1,12.2 | |
8 | M,02/26 | TDP & RSA Diffie-Hellman |
KL 9.1-9.3,12.4,12.5 Note on algebra PDF |
W,02/28 | KEM/DEM Topic: ZK |
KL 12.3 BS 20 Barak’s Note PDF |
|
9 | M,03/04 | ElGamal Digital signatures |
KL 12.,13.1-13.3 |
W,03/06 | Random-oracle PKC with RO Hash-based signature |
KL 6.5,12.5.4,13.4,14.4 | |
10 | W,03/11 | Lattice crypto | KL 14.3 Barak’s note PDF Peikert’s tutorial Youtube |
W,03/13 | Project presentation |