AT: Applied Cryptography
Science Building 4.01.46
When, at where
TR 7:00 -- 8:15 PM, tba
is a research-oriented course. The students are to be
introduced to some cutting-edge research topics.
year's emphasis is on Cryptographic Key Infrastructures, with a
particular emphasis on Public Key Infrastructures (PKIs).
instructor will give you specific problems, each of which, if done
right, can lead to a publishable result.
instructor will work closely with the students throughout thie semester.
Grading policy (tentative)
- Student presenting papers (10%; one
presentation per student)
- Project proposal (10%: one proposal per team)
- Project proposal presentation (10%: one
presentation per team)
- Final project report (20%; one report per
- Take-home exam (10%; 5% each)
- Closed-book exam (20%: one exam)
- Final project presentation (with demo, if
applicable) (10%; one presentation per team)
- Attendance (10%; for the ith absence, -i)
How it works?
instructor will give the specifications of a set of projects in the
context of PKIs.
are encouraged to form teams of 2 - 4
people. Each team works on a sub-project. Each team needs a volunteer
to lead and coordinate the progress of the corresponding sub-project,
and serve as the point-of-contact of the team with the instructor or
the designated research assistant.
project will involve the problem identification,
and implementation, and final report writing. Each project will produce
a written proposal of final technical report (i.e., one copy per team).
with your classmates is encouraged. However, if you do not choose to
work on the projects setup by the instructor, you must come up with
your own project that is compatible. This must be approved by the
instructor in advance. Also, if you want to work alone, you need to get
pre-approval from the instructor.
team needs to meet with the instructor (or a
designated research assistant) periodically (e.g., once every one or
- There is no textbook; the instructor
will provide all the necessary materials.
How should I prepare the
- The instructor
or the designated research assistant will be involved in the
preparation of both proposal and final projects.
Course schedule (tentative, subject to
[Special acknowledgments: The lectures will adopt many
in one way or another, from many colleagues in the research community.
I will acknowledge them on the first slide of each lecture by pointing
to the appropriate source, if available. Many thanks, folks!]
- Aug. 24, Overview of the Course
- Aug. 29, Discussion of suggested projects
- Aug. 31, What is Cryptographic Key Infrastructure? What is
Public Key Infrastructure? Why do we need them?
- Sept. 5, Cryptographic basics I: hash functions
- Sept. 7, Cryptographic basics II: block ciphers, stream
ciphers, and symmetric key cryptosystems
- Sept. 12, Crytographic basics III: digital signatures
- Sept. 14, Cryptographic basics IV: Message authentication
- Sept. 19, Cryptographihc basics V: Public key cryptosystems
- Sept. 21, The certificate revocation problem I
- Sept. 26, The certificate revocation problem II
- Sept. 28, The certificate revocation problem III
- Oct. 3, Identity certificates
- Oct. 5, Attribute certificates
- Oct. 10, Privacy-friendly certificates
- Oct. 12, Identity-based certificates
- Oct. 17, Trusted Computing
- Oct. 19, Can Trused Computing solve the PKI problem?
- Oct. 24, OS security and PKI
- Oct. 26, Identity safety and PKI I
- Oct. 31, Identity safety and PKI II
- Nov. 2, Kleptography
- Nov. 7, Cryptovirus and PKI I
- Nov. 9, Cryptovirus and PKI II
- Nov. 14, PKI vs. Symmetric Key Management I
- Nov. 16, PKI vs. Symmetric Key Management II
- Nov. 21, Trusted Path and PKI
- Nov. 23, Peer-to-peer security and PKI
- Nov. 28, Privacy-friendly PKI
- Nov. 30, Survivability of PKI I
- Dec. 5, Survivability of PKI II
- Dec. 7,
- Dec. 12,
- Dec. 14
Suggested projects / lecture slides / reading list
for Cryptologic Research (IACR)
Goldwasser and Mihir Bellare's Lecture Notes on Cryptography
Foundations of Cryptography