Shouhuai Xu

- none

Science Building 4.01.46

tba

TR 7:00 -- 8:15 PM, tba

- This
is a research-oriented course. The students are to be
introduced to some cutting-edge research topics.

- This year's emphasis is on Cryptographic Key Infrastructures, with a particular emphasis on Public Key Infrastructures (PKIs).
- The instructor will give you specific problems, each of which, if done right, can lead to a publishable result.
- The
instructor will work closely with the students throughout thie semester.

- Student presenting papers (10%; one
presentation per student)

- Project proposal (10%: one proposal per team)
- Project proposal presentation (10%: one presentation per team)
- Final project report (20%; one report per team)
- Take-home exam (10%; 5% each)
- Closed-book exam (20%: one exam)

- Final project presentation (with demo, if applicable) (10%; one presentation per team)
- Attendance (10%; for the ith absence, -i)

- The instructor will give the specifications of a set of projects in the context of PKIs.
- The students are encouraged to form teams of 2 - 4 people. Each team works on a sub-project. Each team needs a volunteer to lead and coordinate the progress of the corresponding sub-project, and serve as the point-of-contact of the team with the instructor or the designated research assistant.
- Each
project will involve the problem identification,
proposal, design
and
analysis
and implementation, and final report writing. Each project will produce
a written proposal of final technical report (i.e., one copy per team).

- Collaboration with your classmates is encouraged. However, if you do not choose to work on the projects setup by the instructor, you must come up with your own project that is compatible. This must be approved by the instructor in advance. Also, if you want to work alone, you need to get pre-approval from the instructor.
- Each team needs to meet with the instructor (or a designated research assistant) periodically (e.g., once every one or two weeks).
- There is no textbook; the instructor
will provide all the necessary materials.

- The instructor
or the designated research assistant will be involved in the
preparation of both proposal and final projects.

[Special acknowledgments: The lectures will adopt many materials, in one way or another, from many colleagues in the research community. I will acknowledge them on the first slide of each lecture by pointing to the appropriate source, if available. Many thanks, folks!]

- Aug. 24, Overview of the Course
- Aug. 29, Discussion of suggested projects

- Aug. 31, What is Cryptographic Key Infrastructure? What is
Public Key Infrastructure? Why do we need them?

- Sept. 5, Cryptographic basics I: hash functions

- Sept. 7, Cryptographic basics II: block ciphers, stream
ciphers, and symmetric key cryptosystems

- Sept. 12, Crytographic basics III: digital signatures

- Sept. 14, Cryptographic basics IV: Message authentication
schemes

- Sept. 19, Cryptographihc basics V: Public key cryptosystems

- Sept. 21, The certificate revocation problem I

- Sept. 26, The certificate revocation problem II

- Sept. 28, The certificate revocation problem III

- Oct. 3, Identity certificates

- Oct. 5, Attribute certificates

- Oct. 10, Privacy-friendly certificates

- Oct. 12, Identity-based certificates

- Oct. 17, Trusted Computing

- Oct. 19, Can Trused Computing solve the PKI problem?

- Oct. 24, OS security and PKI

- Oct. 26, Identity safety and PKI I

- Oct. 31, Identity safety and PKI II

- Nov. 2, Kleptography

- Nov. 7, Cryptovirus and PKI I

- Nov. 9, Cryptovirus and PKI II

- Nov. 14, PKI vs. Symmetric Key Management I

- Nov. 16, PKI vs. Symmetric Key Management II

- Nov. 21, Trusted Path and PKI

- Nov. 23, Peer-to-peer security and PKI

- Nov. 28, Privacy-friendly PKI

- Nov. 30, Survivability of PKI I

- Dec. 5, Survivability of PKI II

- Dec. 7,
- Dec. 12,
- Dec. 14

ePrint of International Association for Cryptologic Research (IACR)

Shafi Goldwasser and Mihir Bellare's Lecture Notes on Cryptography

Oded Goldreich's Foundations of Cryptography

Handbook of Cryptography

Bruce Schenier's Applied Cryptography