Shouhuai Xu

- (Feb. 27) Homework is here (due in class Mar. 8)
- (Mar. 9) Solution is here.
- (Mar. 12) Information about the class project (proposal due in class: Mar.26; final report due in class: April 21):
- How it works? You can work alone or form a team of two. (In the case you need a team with three or more people, you must convince me it is necessary.)
- About the proposal and the final report: The proposal is just a one-page description of what you are planning to do; the final report is your printed no-more-than five-page results.
- For each team, only one proposal and one final report are needed.
- You can turn in your proposal earlier than the deadline, so that you can work on your project as early as possible (if you would prefer to).
- (Mar. 22) Take-home exam is up.

Science Building 4.01.46

- Handbook of Applied Cryptography, by Menezes, van Oorscot, and Vanstone. Here is the book. [Note: We will not necessarily follow this book, and actually it seems that we will be deviating from it for a while. Ultimately, this means that you better attend the classes otherwise you may have a tough time in the second half of the lectures.]

- ePrint of International Association for Cryptologic Research (IACR)
- S. Goldwasser and M. Bellare's Lecture Notes on Cryptography (local copy is here)
- O. Goldreich's Foundations of Cryptography
- W. Mao's Modern Cryptography: Theory and Practice
- B. Schenier's Applied Cryptography
- B. Preneel and V. Rijmen eds., State of the art in applied cryptography
- D. Stinson's Cryptography Theory and Practice
- V. Shoup's A Computational Introduction to Number Theory and Algebra (local copy is here)
- M. Bellare and P. Rogaway's Introduction ot Modern Cryptography

Wensday, 2:30-3:30PM

Monday, Wensday, and Friday, 12:00 -- 12:50 PM; HSS 2.02.10

- This is an introduction course on (pure and applied) cryptography.

- Homework 10%
- Take-home exam 20%
- Midterm exam 20%
- Final exam 25%
- Project 20%
- Class participation 5%

Week Date Lecture 1 (Introduction) Jan. 12 Student survey Jan. 14 Motivation Jan. 16 Lecture 3: Language of Cryptography I2 (Foundation) Jan. 19 No class (MLK Day) Jan. 21 Lecture 4: Language of Cryptography II Jan. 23Lecture 5: Language of Cryptography II 3 (Foundation) Jan. 26 Lecture 6: Language of Cryptography II Jan. 28 Lecture 7: Language of Cryptography II Jan. 30 Lecture 8: Language of Cryptography III4 (Foundation) Feb. 2 Lecture 9: Language of Cryptography IIIFeb. 4 Lecture 10: Language of Cryptography IV Feb. 6Lecture 11: Language of Cryptography IV 5 (Foundation) Feb. 9 Lecture 12: Language of Cryptography IV Feb. 11 Lecture 13: Language of Cryptography IV Feb. 13Lecture 14: Language of Cryptography IV 6 (Foundation) Feb. 16 Lecture 15: Language of Cryptography IV Feb. 18 Lecture 16: Review Feb. 20Lecture 17: Symmetric Key Encryption 7 Feb. 23 Lecture 18: Symmetric Key Encryption Feb. 25 No class; take-home exam. Please print or typewrite a no-more-than-200-word review on this paper; due in class on Feb. 27.

Hint: There is no standard answer. Please do not cut-and-paste any sentence from the paper; instead, you should focus onstating in your own words the points/issues/ideas you really think that they are wonderful/great/illuminating.) Given it is an exam, you arenot allowedto discuss with anyone else. So you must state and certify this on the cover page of your review. Feb. 27Lecture 19: Symmetric Key Encryption 8 Mar. 1 Lecture 20: Symmetric Key Encryption Mar. 3 Lecture 21: Symmetric Key Encryption Mar. 5Lecture 22: Hash Functions 9 Mar. 8 Lecture 23: Hash Functions Homework due in classMar. 10 Review Mar. 12 Midterm exam10 Mar. 15, Mar. 17, Mar. 19 No class (Spring Break; enjoy!) 11 Mar. 22 Lecture 24: Message Authentication Mar. 24 Lecture 25: Message Authentication Mar. 26Lecture 26: Message Authentication Project Proposal Due in Class12 Mar. 29 Lecture 27: Digital Signature Mar. 31 Lecture 28: Digital Signature Apr. 2Lecture 29: Digital Signature 13 Apr. 5 No class; take-home exam. Please print or typewrite a no-more-than-300-word review on this paper; due in class onApril. 7. Be specific, you should at least answer the following questions in your own words: (1) What problem(s) the author addresses? (2) Why there could be such problem(s)? (3) Should the problem(s) have been prevented from happening?

Given it is an exam, you arenot allowedto discuss with anyone else. So you must state and certify this on the cover page of your review.Apr. 7 Lecture 30: Digital Signature Apr. 9Lecture 31: Public Key Cryptosystem 14 Apr. 12 Lecture 32: Public Key Cryptosystem Apr. 14 Lecture 33: Public Key Cryptosystem Apr. 16Lecture 34: Public Key Cryptosystem 15 Apr. 19 Lecture 35: Cryptographic Architecture (Back to fundation) Apr. 21 Lecture 36: One-way and Trapdoor Functions Project Final Report Due in Class(Back to fundation) Apr. 23Lecture 37: Pseudorandom Generator 16 Apr. 26 Lecture 38: Information-Theoretic Security Apr. 28 Review Apr. 30 No class (student study day)17 (last week) May 1 - May 7 (Final exam is scheduled in the class room, 1:30pm-4:15pm, Tuesday, May 4)