Introduction to Cryptography
|| Mondays 11:00am-12:50pm WWH 512
|| Mondays 9:45am-10:45am, WWH 303
Introduction to Cryptography, by Jonathan Katz and Yehuda Lindell. A good introductory book.
Foundations of Cryptography, Vol. 1 and 2 by Oded Goldreich. A comprehensive book for those who want to understand the material in greater depth.
Lecture notes by Yevgeniy Dodis, which we'll follow closely
Lecture notes by Chris Peikert
Lecture notes by Rafael Pass and Abhi Shelat.
Last year's course
My colleagues Thomas Vidick and Stephanie Wehner created an online EdX course on quantum cryptography.
||Active participation in class, homework assignments, final exam|
||Students are expected to be comfortable reading and writing mathematical proofs, be at ease with algorithmic concepts, and have elementary knowledge of discrete math, number theory, and basic probability. No programming will be required for the course.|
|Sep 10||Introduction, Perfect Secrecy. Lectures 1+2 of Peikert, Lecture 1 of Dodis, Section 1.3 of Pass-Shelat.|
|Sep 17||Solving HW0 and HW1 (including proof of Shannon's Theorem). Number theory.|
|Sep 24||One-way functions (and collections thereof). Examples of one-way functions (multiplication and subset sum). Weak one-way functions. Weak OWFs to strong OWFs (statement and informal discussion). Informal discussion of indistinguishability and pseudorandom generators.|
|Oct 1||HW3 Q1 & Q5. Weak OWFs to strong OWFs (the proof). More examples of OWFs: Subset sum (as collection and as function following HW3 Q2); Rabin's function and Rabin's permutation. Application of OWFs to password storage.|
|Oct 9||Indistinguishability. Pseudorandom generators. Expanding PRGs.|
|Oct 15||Blum-Micali PRG. Hard-core bits. Goldreich-Levin; Pseudorandom functions: motivation and definition|
|Oct 22||Constructing Pseudorandom functions|
|Oct 29||Pseudorandom permutations and Luby-Rackoff; symmetric key encryption, definitions of security and constructions|
|Nov 5||Finishing symmetric key encryption|
|Nov 12||Public key encryption; Trapdoor one-way permutations; Diffie-Hellman protocol and ElGamal cryptosystem.|
|Nov 19||Authentication security definition and info theoretic construction.|
|Nov 26||Computational construction of MAC using PRF. Expanding input of MACs using CRHF or almost universal hash functions. Authenticated encryption.|
|Dec 3||Digital Signatures.|
|Dec 10||Lattice-based cryptography|
|Dec 17||Final exam|