Reading are from Cryptography and Network Security: Principles and Practice (Third edition), by William Stallings, Prentice-Hall, 2002, unless stated otherwise.
| Week | Date | Topics | Reading | Homework | Major
Due Dates |
|---|---|---|---|---|---|
| 1 | 8 Mar | Examples from
classical cryptosystems |
Chapter 1 (skim) | ||
| 9 Mar | Types of cryptosystems
and types of attacks |
Chapter 2,
Sections 1 and 2 |
|||
| 11 Mar | Modular arithmetic
and affine ciphers |
Rest of Chapter 2 | Homework 1
assigned |
||
| 12 Mar | Crypto discussion | Crypto,
through p. 65 |
|||
| 2 | 15 Mar | Perfect secrecy | Reread pp. 29-30
Lecture notes |
||
| 16 Mar | Feistel ciphers
Simplified DES (Data Encryption Standard) |
Chapter 3, Section 2 | |||
| 18 Mar | Simplified DES
(Data Encryption Standard) |
Chapter 3, Section 1 | Homework 2
assigned |
Homework 1 due | |
| 19 Mar | DES | Chapter 3, Section 3 | |||
| 3 | 22 Mar | Breaking DES:
Brute force cryptanalysis Breaking DES: Differential cryptanalysis |
Chapter 3,
Sections 4 and 5 |
||
| 23 Mar | Breaking DES:
Differential cryptanalysis |
Handout from class | |||
| 25 Mar | Design principles for block ciphers
Design principles for AES (Advanced Encryption Standard) |
Chapter 3, Section 6
FIPS 46 (handout) Chapter 5, Section 1 Communications Security for the Twenty-first Century: The Advanced Encryption Standard Advanced Encryption Standard (AES) Questions and Answers |
Please do the readings
before class so that we can have a meaningful discussion |
||
| 26 Mar | Finite fields for AES | Chapter 4, Section 5 | Homework 3
assigned |
Homework 2 due | |
| 4 | 29 Mar | Finite fields for AES | Chapter 4, Section 6 | ||
| 30 Mar | AES | Chapter 5, section 2
Readings on AES |
|||
| 1 Apr | Simplified AES | Handout from class | Homework 4
assigned |
Homework 3 due | |
| 2 Apr | Crypto discussion:
Public key |
Crypto, pp. 66 -- 89 | |||
| 5 | 12 Apr | Principles of
public key cryptosystems Exponential ciphers |
Chapter 9, Section 1
Lecture notes |
||
| 13 Apr | Crypto discussion:
Prime time |
Crypto, pp. 90 -- 124 | |||
| 15 Apr | Number theory
for the RSA (Rivest, Shamir, Adleman) public key cryptosystem |
Chapter 8,
Sections 1 and 2 |
Homework 5
assigned |
Homework 4 math due Homework 3.5 CS due |
|
| 16 Apr | RSA | Chapter 9, Section 2 | Begin thinking about
your presentation |
||
| 6 | 19 Apr | Efficiency of RSA:
Fast exponentiation |
Handout from class | Homework 4 CS due | |
| 20 Apr | Efficiency of RSA:
Primality testing |
Chapter 8, Section 3 | |||
| 22 Apr | Security of RSA:
Factoring |
Article
by Pomerance
on Factoring Other Attacks on RSA Lecture notes |
|||
| 23 Apr | Security of RSA:
Factoring Diffie-Hellman Key Exchange |
Chapter 10, Section 2 | Homework 6
assigned |
Homework 5 due Presentation article
|
|
| 7 | 26 Apr | Diffie-Hellman Key Exchange | Lecture notes | ||
| 27 Apr | Authentication and digital signatures | Chapter 11, Section 1
Chapter 13, Sections 1 and 2 Lecture notes |
|||
| 29 Apr | Elliptic Curve Cryptography (ECC) | Chapter 10, Section 3
Lecture notes |
Homework 7
assigned |
Homework 6 due | |
| 30 Apr | Crypto discussion | Crypto, pp. 125 -- 186 | |||
| 8 | 3 May | Elliptic Curve Cryptography (ECC) | Chapter 10, Section 4
Lecture notes |
||
| 4 May | Crypto discussion | Crypto,
pp. 187 -- 225 |
|||
| 6 May | Prepare for presentations:
How to give a (bad) talk |
Begin thinking about
your research proposal | |||
| 7 May | Prepare for presentations
(no class) |
||||
| 9 | 10 May | Prepare for presentations
(no class) |
Homework 7 due | ||
| 11 May | The Digital Signature Algorithm (DSA) and subliminal channels | Chapter 13, Section 3
Lecture notes |
|||
| 13 May | Presentations
in class |
||||
| 14 May | Presentations
in class |
||||
| 10 | 17 May | Presentations
in class |
|||
| 18 May | Presentations
in class Bit Commitment Schemes |
||||
| 20 May | Zero-knowledge proofs | ||||
| 21 May | Crypto discussion
Course evaluation |
Crypto,
pp. 226 to end |
|||
| Finals | 24 May | Research proposals due |