Date | Topics\slides | Outline | Readings | Lecture notes |
---|---|---|---|---|
Week 1: Jan 10 | Course Overview [slides] | course plan, reading materials, grading, a brief introduction to every topic |
[Sta] William Stallings, Cryptography and Network Security: Principles and Practice [Du] Wenliang Du, Computer Security: A Hands-on Approach [KPS] Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World [KL] Jonathan Katz, and Yehuda Lindell, Introduction to Modern Cryptography |
|
Week 2: Jan 17 | Basic Cryptography 1: Symmetric-key cryptography [slides] | symmetric encryption, one-time pad, blockcipher, hash function, MAC, authenticated encryption. |
[KL] Section 2-7 [Std] Chapter 3, 5, 6, 7, 11, 12 Goldreich, Foundation of Cryptography II, Section 5.3.1, 5.3.2, 5.3.3, 5.4.3. |
Lecture 2 by Haiyang Xue Source code |
Week 3: Jan 31 | Basic Cryptography 2: Public-key cryptography [slides] | Diffie-Hellman, public key encryption, RSA, Digital signature | [KL] Section 8, 10,11, 12.1-12.5 |
Lecture 3 by Huijiong Yang, Tianyu Zheng, Zhikang Xie |
Week 4: Feb 7 | Network Security Principles [slides] | authenticated key exchange, PKI, and certification authorities | [KL] Section 12.7 Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, Section 22 [Du] Section 24 |
Lecture 4 by Jialong Zhou and Zhiyuan Sun |
Week 5: Feb 14 | Network Security in Practice [slides] | secure sockets layer (SSL), transport layer security (TLS), HTTPS | [Sta] Section 16 [KPS] Section 13 RFC 2246, 5246, 8446 |
Lecture 5 by Zizhao Peng, Jerry Tong and Fangxiao Wang |
Week 6: Feb 21 | Authentication [slides][outline] | access control, password authentication, biometric authentication, public key authentication | Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, Section 18 Authentication Cheat Sheet An Administrator’s Guide to Internet Password Research Biometrics: A Tool for Information Security SSH.com RFC 4251, 4252 [KPS] Section 13.8 |
Lecture 6 by Sai Ho Cheung, Weimin Chen, and Junjie Ma |
Week 7: Feb 28 | Privacy-Enhancing Technologies 1 [slides][outline] |
post-quantum cryptography and fully-homomorphic encryption |
Post-quantum Cryptography by NIST Cryptographic Standards in the Post-Quantum Era Awesome Homomorphic Encryption in Github Homomorphic Encryption Standardization |
Lecture 7 by Yerkezhan Sartayeva and Haiyang Xue |
Week 8: Mar 7 | Privacy-Enhancing Technologies 2 [slides] |
zero-knowledge proofs | Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, Section 19, 20 Berry Schoenmakers, Lecture Notes Cryptographic Protocols, Section 4, 5 awesome-zero-knowledge-proofs |
Lecture 8 by Rui Song and Yuhuan Liu |
Week 9: Mar 14 | Privacy-Enhancing Technologies 3 [slides] |
secure multiparty computation |
David Evans, Vladimir Kolesnikov and Mike Rosulek, A Pragmatic Introduction to
Secure Multi-Party Computation, Section 1, 2, 3 Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, Section 23 Lindell, Resources for Getting Started with MPC |
Lecture 9 by Donghui Dai, Huaien Zhang |
Week 10: Mar 21 | Security and Privacy in Practice | security and privacy in Blockchain |
Blockchain whitepaper blockchain.com |
|
Week 11: Mar 28 | Recap | |||
Week 12: Apr 4 | Final presentation 1 | papers from S&P, CCS, USENIX, NDSS, CRYPTO, or EUROCRYPT | ||
Week 13: Apr 11 | Final presentation 2 | papers from S&P, CCS, USENIX, NDSS, CRYPTO, or EUROCRYPT |