Lecture plan

Lecture Date Topic Recommended reading
1 28.08 Introduction to cryptography, historical ciphers, perfect privacy, one-time pad, probability theory Chapter 1 + 2 in [BR]
2 04.09 Block ciphers, PRF/PRPs, AES  Chapter 3 + 4  in [BR] (4.8-4.10 can be skipped) 
3 11.09 Symmetric encryption, IND-CPA, CTR/CBC-mode Chapter 5 in [BR] (5.6+5.8 can be skipped)
4 18.09 MACs, UF-CMA, CBC-MAC, CMAC Chapter 7 in [BR] (7.8 can be skipped)
5 25.09 Authenticated encryption, IND-CCA, AEAD, GCM-mode Course note
6 02.10 Hash functions, SHA1/SHA2, HMAC Chapter 6 + Appendix A (birthday problem) in [BR], Chapter 11 [PP]
7 09.10 Randomness and entropy, random number generators, PRNGs, stream ciphers

https://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/

https://blog.cr.yp.to/20170723-random.html

8 16.10 Group theory, Diffie-Hellman key exchange Chapter 9 + 10.1-10.2 in [BR] (9.4 can be skipped)
9 23.10 Diffie-Hellman II, elliptic curves, backdoors Chapter 8 + 9 in [PP] (8.5 can be skipped)
10 30.10 Diffie-Hellman III, computational aspects, Signal/What's App/Signal  
11 06.11 Public-key encryption, IND-CPA, ElGamal Chapter 11 in [BR], Chapter 7 in [PP]
12 13.11 Digital signatures, UF-CMA, Schnorr, RSA, Public-key infrastructure (PKI) Chapter 12 in [BR] (12.3.6 can be skipped), Chapter 10 in [PP] (10.3 can be skipped)
13 20.11 Quantum computers, Shor's algorithm, post-quantum cryptography TBD
14 27.11 Course recap  

[BR] Mihir Bellare and Phillip Rogaway. Introduction to Modern Cryptography. 2005.

[PP] Christof Paar and Jan Pelzl. Understanding Cryptography - A Textbook for Students and Practitioners. Springer, 2010.

Published Aug. 13, 2024 12:17 AM - Last modified Aug. 23, 2024 5:08 PM