Reading are from Cryptography and Network Security: Principles and Practice (Third edition), by William Stallings, Prentice-Hall, 2002, unless stated otherwise.
| Week | Date | Topics | Reading | Homework | Major Due Dates | 
|---|---|---|---|---|---|
| 1 | 8 Mar | Examples from classical cryptosystems | Chapter 1 (skim) | ||
| 9 Mar | Types of cryptosystems and types of attacks | Chapter 2, Sections 1 and 2 | |||
| 11 Mar | Modular arithmetic and affine ciphers | Rest of Chapter 2 | Homework 1 assigned | ||
| 12 Mar | Crypto discussion | Crypto, through p. 65 | |||
| 2 | 15 Mar | Perfect secrecy | Reread pp. 29-30 Lecture notes | ||
| 16 Mar | Feistel ciphers Simplified DES (Data Encryption Standard) | Chapter 3, Section 2 | |||
| 18 Mar | Simplified DES (Data Encryption Standard) | Chapter 3, Section 1 | Homework 2 assigned | Homework 1 due | |
| 19 Mar | DES | Chapter 3, Section 3 | |||
| 3 | 22 Mar | Breaking DES: Brute force cryptanalysis Breaking DES: Differential cryptanalysis | Chapter 3, Sections 4 and 5 | ||
| 23 Mar | Breaking DES: Differential cryptanalysis | Handout from class | |||
| 25 Mar | Design principles for block ciphers Design principles for AES (Advanced Encryption Standard) | Chapter 3, Section 6 FIPS 46 (handout) Chapter 5, Section 1 Communications Security for the Twenty-first Century: The Advanced Encryption Standard Advanced Encryption Standard (AES) Questions and Answers | Please do the readings before class so that we can have a meaningful discussion | ||
| 26 Mar | Finite fields for AES | Chapter 4, Section 5 | Homework 3 assigned | Homework 2 due | |
| 4 | 29 Mar | Finite fields for AES | Chapter 4, Section 6 | ||
| 30 Mar | AES | Chapter 5, section 2 Readings on AES | |||
| 1 Apr | Simplified AES | Handout from class | Homework 4 assigned | Homework 3 due | |
| 2 Apr | Crypto discussion: Public key | Crypto, pp. 66 -- 89 | |||
| 5 | 12 Apr | Principles of public key cryptosystems Exponential ciphers | Chapter 9, Section 1 Lecture notes | ||
| 13 Apr | Crypto discussion: Prime time | Crypto, pp. 90 -- 124 | |||
| 15 Apr | Number theory for the RSA (Rivest, Shamir, Adleman) public key cryptosystem | Chapter 8, Sections 1 and 2 | Homework 5 assigned | Homework 4 math due Homework 3.5 CS due | |
| 16 Apr | RSA | Chapter 9, Section 2 | Begin thinking about your presentation | ||
| 6 | 19 Apr | Efficiency of RSA: Fast exponentiation | Handout from class | Homework 4 CS due | |
| 20 Apr | Efficiency of RSA: Primality testing | Chapter 8, Section 3 | |||
| 22 Apr | Security of RSA: Factoring | Article
by Pomerance on Factoring Other Attacks on RSA Lecture notes | |||
| 23 Apr | Security of RSA: Factoring Diffie-Hellman Key Exchange | Chapter 10, Section 2 | Homework 6 assigned | Homework 5 due Presentation article
 | |
| 7 | 26 Apr | Diffie-Hellman Key Exchange | Lecture notes | ||
| 27 Apr | Authentication and digital signatures | Chapter 11, Section 1 Chapter 13, Sections 1 and 2 Lecture notes | |||
| 29 Apr | Elliptic Curve Cryptography (ECC) | Chapter 10, Section 3 Lecture notes | Homework 7 assigned | Homework 6 due | |
| 30 Apr | Crypto discussion | Crypto, pp. 125 -- 186 | |||
| 8 | 3 May | Elliptic Curve Cryptography (ECC) | Chapter 10, Section 4 Lecture notes | ||
| 4 May | Crypto discussion | Crypto, pp. 187 -- 225 | |||
| 6 May | Prepare for presentations: How to give a (bad) talk | Begin thinking about your research proposal | |||
| 7 May | Prepare for presentations (no class) | ||||
| 9 | 10 May | Prepare for presentations (no class) | Homework 7 due | ||
| 11 May | The Digital Signature Algorithm (DSA) and subliminal channels | Chapter 13, Section 3 Lecture notes | |||
| 13 May | Presentations in class | ||||
| 14 May | Presentations in class | ||||
| 10 | 17 May | Presentations in class | |||
| 18 May | Presentations in class Bit Commitment Schemes | ||||
| 20 May | Zero-knowledge proofs | ||||
| 21 May | Crypto discussion Course evaluation | Crypto, pp. 226 to end | |||
| Finals | 24 May | Research proposals due |