Computer Science
|
Introduction to CryptographyCSCI-GA 3210-001 |
Fall 2016 |
For hints and further reading, use the Hint-o-matic.
Lectures
|
Mondays 11:00am-12:50pm WWH 517 |
Instructor |
Oded Regev |
Office hours
|
Mondays 9:45am-10:45am, WWH 303 |
Reading |
Introduction to Cryptography, by Jonathan Katz and Yehuda Lindell. A good introductory book.
Foundations of Cryptography, Vol. 1 and 2 by Oded Goldreich. A comprehensive book for those who want to understand the material in greater depth. Lecture notes by Yevgeniy Dodis, which we'll follow closely Lecture notes by Chris Peikert Lecture notes by Rafael Pass and Abhi Shelat. Last year's course |
Requirements |
Active participation in class, homework assignments, final exam |
Prerequisites |
Students are expected to be comfortable reading and writing mathematical proofs, be at ease with algorithmic concepts, and have elementary knowledge of discrete math, number theory, and basic probability. No programming will be required for the course. |
Date | Class Topic |
Sep 12 | Introduction, Perfect Secrecy. Number theory. Lectures 1+2 of Peikert, Lecture 1 of Dodis, Section 1.3 of Pass-Shelat. |
Sep 19 | (Proof of Shannon's Theorem) Finishing number theory. One-way functions (and collections thereof). Weak one-way functions. |
Sep 26 | Examples of one-way functions. Weak OWFs to strong OWFs. Informal discussion of indistinguishability and pseudorandom generators. |
Oct 3 | Collections of one-way functions. More examples of OWFs. Application of OWFs to password storage. |
Oct 17 | Indistinguishability. Pseudorandom generators. Expanding PRGs. |
Oct 24 | Blum-Micali PRG. Hard-core bits. Goldreich-Levin; Pseudorandom functions: motivation and definition |
Oct 31 | Constructing Pseudorandom functions |
Nov 7 | Pseudorandom permutations and Luby-Rackoff; symmetric key encryption, definitions of security and constructions |
Nov 14 | Finishing symmetric key encryption |
Nov 21 | Public key encryption; Trapdoor one-way permutations; Diffie-Hellman protocol and ElGamal cryptosystem. |
Nov 28 | Authentication security definition and info theoretic construction. |
Dec 5 | Computational construction of MAC using PRF. Expanding input of MACs using CRHF or almost universal hash functions. Authenticated encryption. |
Dec 12 | Digital Signatures. |
Dec 13 | Lattice-based cryptography (bonus class) |
Dec 19 | Final exam |