Reading are from Cryptography and Network Security: Principles and Practice (Third edition), by William Stallings, Prentice-Hall, 2002, unless stated otherwise.
Week | Date | Topics | Reading | Homework | Major
Due Dates |
---|---|---|---|---|---|
1 | 8 Mar | Examples from
classical cryptosystems |
Chapter 1 (skim) | ||
9 Mar | Types of cryptosystems
and types of attacks |
Chapter 2,
Sections 1 and 2 |
|||
11 Mar | Modular arithmetic
and affine ciphers |
Rest of Chapter 2 | Homework 1
assigned |
||
12 Mar | Crypto discussion | Crypto,
through p. 65 |
|||
2 | 15 Mar | Perfect secrecy | Reread pp. 29-30
Lecture notes |
||
16 Mar | Feistel ciphers
Simplified DES (Data Encryption Standard) |
Chapter 3, Section 2 | |||
18 Mar | Simplified DES
(Data Encryption Standard) |
Chapter 3, Section 1 | Homework 2
assigned |
Homework 1 due | |
19 Mar | DES | Chapter 3, Section 3 | |||
3 | 22 Mar | Breaking DES:
Brute force cryptanalysis Breaking DES: Differential cryptanalysis |
Chapter 3,
Sections 4 and 5 |
||
23 Mar | Breaking DES:
Differential cryptanalysis |
Handout from class | |||
25 Mar | Design principles for block ciphers
Design principles for AES (Advanced Encryption Standard) |
Chapter 3, Section 6
FIPS 46 (handout) Chapter 5, Section 1 Communications Security for the Twenty-first Century: The Advanced Encryption Standard Advanced Encryption Standard (AES) Questions and Answers |
Please do the readings
before class so that we can have a meaningful discussion |
||
26 Mar | Finite fields for AES | Chapter 4, Section 5 | Homework 3
assigned |
Homework 2 due | |
4 | 29 Mar | Finite fields for AES | Chapter 4, Section 6 | ||
30 Mar | AES | Chapter 5, section 2
Readings on AES |
|||
1 Apr | Simplified AES | Handout from class | Homework 4
assigned |
Homework 3 due | |
2 Apr | Crypto discussion:
Public key |
Crypto, pp. 66 -- 89 | |||
5 | 12 Apr | Principles of
public key cryptosystems Exponential ciphers |
Chapter 9, Section 1
Lecture notes |
||
13 Apr | Crypto discussion:
Prime time |
Crypto, pp. 90 -- 124 | |||
15 Apr | Number theory
for the RSA (Rivest, Shamir, Adleman) public key cryptosystem |
Chapter 8,
Sections 1 and 2 |
Homework 5
assigned |
Homework 4 math due Homework 3.5 CS due |
|
16 Apr | RSA | Chapter 9, Section 2 | Begin thinking about
your presentation |
||
6 | 19 Apr | Efficiency of RSA:
Fast exponentiation |
Handout from class | Homework 4 CS due | |
20 Apr | Efficiency of RSA:
Primality testing |
Chapter 8, Section 3 | |||
22 Apr | Security of RSA:
Factoring |
Article
by Pomerance
on Factoring Other Attacks on RSA Lecture notes |
|||
23 Apr | Security of RSA:
Factoring Diffie-Hellman Key Exchange |
Chapter 10, Section 2 | Homework 6
assigned |
Homework 5 due Presentation article
|
|
7 | 26 Apr | Diffie-Hellman Key Exchange | Lecture notes | ||
27 Apr | Authentication and digital signatures | Chapter 11, Section 1
Chapter 13, Sections 1 and 2 Lecture notes |
|||
29 Apr | Elliptic Curve Cryptography (ECC) | Chapter 10, Section 3
Lecture notes |
Homework 7
assigned |
Homework 6 due | |
30 Apr | Crypto discussion | Crypto, pp. 125 -- 186 | |||
8 | 3 May | Elliptic Curve Cryptography (ECC) | Chapter 10, Section 4
Lecture notes |
||
4 May | Crypto discussion | Crypto,
pp. 187 -- 225 |
|||
6 May | Prepare for presentations:
How to give a (bad) talk |
Begin thinking about
your research proposal | |||
7 May | Prepare for presentations
(no class) |
||||
9 | 10 May | Prepare for presentations
(no class) |
Homework 7 due | ||
11 May | The Digital Signature Algorithm (DSA) and subliminal channels | Chapter 13, Section 3
Lecture notes |
|||
13 May | Presentations
in class |
||||
14 May | Presentations
in class |
||||
10 | 17 May | Presentations
in class |
|||
18 May | Presentations
in class Bit Commitment Schemes |
||||
20 May | Zero-knowledge proofs | ||||
21 May | Crypto discussion
Course evaluation |
Crypto,
pp. 226 to end |
|||
Finals | 24 May | Research proposals due |