Date | Topics\slides | Outline | Readings | Lecture notes |
---|---|---|---|---|
Week 1: Jan 15 | Course Overview [slides] | course plan, reading materials, grading, a brief introduction to every topic |
[KL] Jonathan Katz, and Yehuda Lindell, Introduction to Modern Cryptography [BS] Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography [Sta] William Stallings, Cryptography and Network Security: Principles and Practice [Du] Wenliang Du, Computer Security: A Hands-on Approach [KPS] Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World |
|
Week 2: Jan 22 | Basic Cryptography 1: Symmetric-key cryptography [slides] | symmetric encryption, one-time pad, blockcipher, hash function, MAC, authenticated encryption. |
[KL] Section 2-7 [Std] Chapter 3, 5, 6, 7, 11, 12 Goldreich, Foundation of Cryptography II, Section 5.3.1, 5.3.2, 5.3.3, 5.4.3. |
Lecture 2 by Haiyang Xue Source code |
Week 3: Jan 29 | Basic Cryptography 2: Public-key cryptography [slides], [sage] | Diffie-Hellman, public key encryption, RSA, Digital signature | [KL] Section 8, 10,11, 12.1-12.5 A security website |
Lecture 3 |
Week 4: Feb 5 | Network Security Principles [slides] | authenticated key exchange, PKI, and certification authorities | [KL] Section 12.7 [BS], Section 22 [Du] Section 24 |
Lecture 4 |
Week 5: Feb 19 | Network Security in Practice [slides] | secure sockets layer (SSL), transport layer security (TLS), HTTPS | [Sta] Section 16 [KPS] Section 13 RFC 2246, 5246, 8446 |
Lecture 5 |
Week 6: Feb 26 | Authentication [slides] | access control, password authentication, biometric authentication, public key authentication | [BS], Section 18 Authentication Cheat Sheet An Administrator’s Guide to Internet Password Research Biometrics: A Tool for Information Security SSH.com RFC 4251, 4252 [KPS] Section 13.8 |
Lecture 6 |
Week 7: Mar 4 | Privacy-Enhancing Technologies 1 [slides] |
post-quantum cryptography and fully-homomorphic encryption |
Post-quantum Cryptography by NIST Cryptographic Standards in the Post-Quantum Era Awesome Homomorphic Encryption in Github Homomorphic Encryption Standardization |
Lecture 7 |
Week 8: Mar 11 | Privacy-Enhancing Technologies 2 [slides] |
zero-knowledge proofs | [BS], Section 19, 20 Berry Schoenmakers, Lecture Notes Cryptographic Protocols, Section 4, 5 awesome-zero-knowledge-proofs |
Lecture 8 |
Week 9: Mar 18 | Privacy-Enhancing Technologies 3 [slides] |
secure multiparty computation |
David Evans, Vladimir Kolesnikov and Mike Rosulek, A Pragmatic Introduction to
Secure Multi-Party Computation, Section 1, 2, 3 [BS], Section 23 Lindell, Resources for Getting Started with MPC |
Lecture 9 |
Week 10: Mar 25 | Guest Lecture: Blockchain | security and privacy in Blockchain |
Blockchain whitepaper blockchain.com |
|
Week 11: Apr 1 | Easter Holiday | |||
Week 12: Apr 8 | Final presentation 1 | papers from S&P, CCS, USENIX, NDSS, CRYPTO, or EUROCRYPT | ||
Week 13: Apr 15 | Final presentation 2 | papers from S&P, CCS, USENIX, NDSS, CRYPTO, or EUROCRYPT |