COMP6712 Advanced Security and Privacy
2022/23 Semester 2
Department of Computing, PolyU


General Information

Outline

This course will cover the most important features of security and privacy issues. The topics include network security, computer security and privacy-preserving computation (aka secure computation), and relevant knowledge in basic cryptography and advanced privacy-enhancing technologies. Two case studies of security and privacy in Blockchain and AI are also included. Refer to the syllabus for details.

Updating Announcements

Syllabus

The syllabus [pdf] is subject to change, and I will continuously update it as the semester progresses.
Date Topics\slides Outline Readings Lecture notes
Week 1: Jan 10 Course Overview [slides] course plan, reading materials, grading, a brief introduction to every topic [Sta] William Stallings, Cryptography and Network Security: Principles and Practice
[Du] Wenliang Du, Computer Security: A Hands-on Approach
[KPS] Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World
[KL] Jonathan Katz, and Yehuda Lindell, Introduction to Modern Cryptography
Week 2: Jan 17 Basic Cryptography 1: Symmetric-key cryptography [slides] symmetric encryption, one-time pad, blockcipher, hash function, MAC, authenticated encryption. [KL] Section 2-7
[Std] Chapter 3, 5, 6, 7, 11, 12
Goldreich, Foundation of Cryptography II, Section 5.3.1, 5.3.2, 5.3.3, 5.4.3.
Lecture 2 by Haiyang Xue
Source code
Week 3: Jan 31 Basic Cryptography 2: Public-key cryptography [slides] Diffie-Hellman, public key encryption, RSA, Digital signature [KL] Section 8, 10,11, 12.1-12.5 Lecture 3 by Huijiong Yang, Tianyu Zheng, Zhikang Xie
Week 4: Feb 7 Network Security Principles [slides] authenticated key exchange, PKI, and certification authorities [KL] Section 12.7
Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, Section 22
[Du] Section 24
Lecture 4 by Jialong Zhou and Zhiyuan Sun
Week 5: Feb 14 Network Security in Practice [slides] secure sockets layer (SSL), transport layer security (TLS), HTTPS [Sta] Section 16
[KPS] Section 13
RFC 2246, 5246, 8446
Lecture 5 by Zizhao Peng, Jerry Tong and Fangxiao Wang
Week 6: Feb 21 Authentication [slides][outline] access control, password authentication, biometric authentication, public key authentication Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, Section 18
Authentication Cheat Sheet
An Administrator’s Guide to Internet Password Research
Biometrics: A Tool for Information Security
SSH.com
RFC 4251, 4252
[KPS] Section 13.8
Lecture 6 by Sai Ho Cheung, Weimin Chen, and Junjie Ma
Week 7: Feb 28 Privacy-Enhancing Technologies 1
[slides][outline]
post-quantum cryptography and fully-homomorphic encryption Post-quantum Cryptography by NIST
Cryptographic Standards in the Post-Quantum Era
Awesome Homomorphic Encryption in Github
Homomorphic Encryption Standardization
Lecture 7 by Yerkezhan Sartayeva and Haiyang Xue
Week 8: Mar 7 Privacy-Enhancing Technologies 2
[slides]
zero-knowledge proofs Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, Section 19, 20
Berry Schoenmakers, Lecture Notes Cryptographic Protocols, Section 4, 5
awesome-zero-knowledge-proofs
Lecture 8 by Rui Song and Yuhuan Liu
Week 9: Mar 14 Privacy-Enhancing Technologies 3
[slides]
secure multiparty computation David Evans, Vladimir Kolesnikov and Mike Rosulek, A Pragmatic Introduction to Secure Multi-Party Computation, Section 1, 2, 3
Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, Section 23
Lindell, Resources for Getting Started with MPC
Lecture 9 by Donghui Dai, Huaien Zhang
Week 10: Mar 21 Security and Privacy in Practice security and privacy in Blockchain Blockchain whitepaper
blockchain.com
Week 11: Mar 28 Recap
Week 12: Apr 4 Final presentation 1 papers from S&P, CCS, USENIX, NDSS, CRYPTO, or EUROCRYPT
Week 13: Apr 11 Final presentation 2 papers from S&P, CCS, USENIX, NDSS, CRYPTO, or EUROCRYPT

Grading

It will be based on two assignments (20%), projects (45%), and a final exam (35%).
Assignments
Projects: final presentation and lecture notes. All submissions will be made public. Final exam: I will give a Summary of what you should know about the final.

Enjoy!