1 | Introduction | |
2 | User Authentication Overview, Passwords, Hashing | |
3 | Hash Functions | PS 1 Out |
4 | More Hashing Applications, Unconditional Security | |
5 | Unconditional Security | PS 1 Due
PS 2 Out |
6 | Block Ciphers, Modes of Operation | |
7 | Intro to Number-Theoretic Crypto | PS 2 Due
PS 3 Out |
8 | GCD and Modular Inverses, Generators, Discrete Logs, Diffie-Hellman Key Exchange, El Gamal Encryption and Signatures | |
9 | RSA, Chosen-Ciphertext Attacks, RSA-OAEP | PS 3 Due
PS 4 Out |
10 | Cramer-Shoup, Commitment Schemes | |
11 | Quiz 1 | |
12 | Key Agreement | |
13 | SSL, IBS, IBE and Secret Sharing | PS 4 Due |
14 | Secret Sharing | |
15 | Zero-Knowledge | Project Proposal Due
Midterm Out |
16 | Watermarking and Fingerprinting (Guest Lecture) | |
17 | Tamper Resistance and Disk Forensics | Midterm Due
PS 5 Out |
18 | Physical Security: Physical Uncloneable Functions, TEMPEST | |
19 | Self-Referential Programs, Viruses, Buffer Overflow Attacks | PS 5 Due
PS 6 Out |
20 | More on Viruses | PS 6 Due |
21 | Trusted Computing (NGSCB aka Palladium; TCPA) | |
22 | Trusted Computing, Java Security, Biometrics | |
23 | Quiz 2, Concluding Remarks | |
24 | Talks | |
25 | Talks | |
26 | Talks | Written Term Projects Due
Last Day of Classes |