Reading are from Cryptography and Network Security: Principles and Practice (Third edition), by William Stallings, Prentice-Hall, 2002, unless stated otherwise.
Week | Date | Topics | Reading | Homework | Major
Due Dates |
---|---|---|---|---|---|
1 | 10 Mar | Examples from
Classical Cryptosystems |
Chapter 1 (skim) | ||
11 Mar | Types of cryptosystems
and types of attacks |
Chapter 2,
Sections 1 and 2 |
|||
13 Mar | Modular arithmetic
and affine ciphers |
Rest of Chapter 2 | Homework 1
assigned |
||
14 Mar | Crypto discussion | Crypto,
through p. 65 Also a handout |
|||
2 | 17 Mar | Perfect secrecy | Reread pp. 29-30
Also see the lecture notes |
||
18 Mar | Simplified DES
(Data Encryption Standard) |
Chapter 3, Section 1 | |||
20 Mar | DES
(Data Encryption Standard) |
Chapter 3,
Sections 2 and 3 |
Homework 2
assigned |
Homework 1 due | |
Rose-Hulman
Undergraduate Math conference. No class, but please attend a talk at the conference |
|||||
3 | 24 Mar | Breaking DES:
Brute force cryptanalysis Breaking DES: Differential cryptanalysis |
Chapter 3,
Sections 4 and 5 |
||
25 Mar | Breaking DES:
Differential cryptanalysis |
Lecture notes | |||
27 Mar | Design principles for block ciphers
Design principles for AES (Advanced Encryption Standard) |
Chapter 3, Section 6
Chapter 5, Section 1 Communications Security for the Twenty-first Century: The Advanced Encryption Standard Advanced Encryption Standard (AES) Questions and Answers |
Please do the readings
before class so that we can have a meaningful discussion |
||
28 Mar | Finite fields for AES | Chapter 4,
Sections 1 through 3 |
|||
4 | 31 Mar | Finite fields for AES | Chapter 4,
Sections 4 and 5 |
Homework 3
assigned |
Homework 2 due |
1 Apr | Finite fields for AES | Rest of Chapter 4 | |||
3 Apr | The AES cipher | Chapter 5, section 2
Readings on AES |
|||
4 Apr | Crypto discussion:
Public key |
Crypto, pp. 66 -- 89 | |||
5 | 7 Apr | Principles of
public key cryptosystems The RSA (Rivest, Shamir, Adleman) public key cryptosystem |
Chapter 9, Section 1 | Homework 4
assigned |
Homework 3 due |
8 Apr | Crypto discussion:
Prime time |
Crypto, pp. 90 -- 124 | |||
10 Apr | Number theory
for RSA |
Chapter 8,
Sections 1 and 2 |
|||
11 Apr | Correctness of RSA | Chapter 9, Section 2 | |||
6 | 14 Apr | Efficiency of RSA:
Fast exponentiation |
Chapter 9, Section 2 | ||
15 Apr | Efficiency of RSA:
Primality testing |
Chapter 8, Section 3 | |||
17 Apr | Security of RSA:
Factoring |
Article
by Pomerance
on Factoring Other Attacks on RSA Lecture notes |
Begin thinking about
your presentation Homework 5 assigned |
Homework 4 due | |
18 Apr | Diffie-Helman Key Exchange | Chapter 10, Section 2 | |||
7 | 28 Apr | Elliptic Curve Cryptography (ECC) | Chapter 10, Section 3
Lecture notes |
||
29 Apr | Authentication and digital signatures | Chapter 13, Sections 1 and 2 | |||
1 May | Elliptic Curve Cryptography (ECC) | Chapter 10, Section 4
Lecture notes |
|||
2 May | Crypto discussion | Crypto, pp. 125 -- 186
Presentation article submitted for approval |
|||
8 | 5 May | Prepare for presentations:
How to give a (bad) talk |
|||
6 May | Crypto discussion | Crypto,
pp. 187 -- 225 |
|||
8 May | Prepare for presentations
(no class) |
||||
9 May | Prepare for presentations
(no class) |
Homework 5 due | |||
9 | 12 May | Prepare for presentations
(no class) |
Homework 6
assigned |
||
13 May | Presentations
in class AND outside of class! |
||||
15 May | Presentations
in class AND outside of class! |
||||
16 May | Presentations
in class AND outside of class! |
||||
10 | 19 May | Presentations
in class AND outside of class! |
|||
20 May | Presentations
in class AND outside of class! |
Math-inspired portion of Homework 6 due | |||
22 May | Subliminal channels and/or Zero-knowledge proofs | CS-inspired portion of Homework 6 due (by noon) | |||
23 May | Crypto discussion
Course evaluation |
Crypto,
pp. 226 to end |
|||
11 | 26 May | Research proposals due to David Mutchler by email by noon |