CO 487: Applied Cryptography (Winter 2015)

Instructor: David Jao, djao@math, MC 5032
Office hours: MWF 10:00am-11:30am

Teaching assistants:

Kenwrick Mayo kamayo MC 6011 Office hours: WTh 11:30-12:30
Luis Ruiz-Lopez laruizlo MC 5497 Office hours: WF 12:30-1:30pm
Anirudh Sankar asankara MC 5133 Office hours: F 1:00-2:00pm
Chris Leonardi cfoleona MC 5481 Office hours: M 3:30-4:30pm, T 1:00-2:00pm

It is highly recommended that students join the Google+ community (https://plus.google.com/communities/107377900372235365251) for CO 487 to keep up to date with online discussions of assignment problems and administrative issues.

Course materials

Schedule

The (tentative) schedule for the course is as follows:

Lectures

  1. Introduction (http:../../wiki/images/3/3d/CO487-2015-slides01.pdf) (January 5)
  2. Symmetric-key encryption (http:../../wiki/images/9/97/CO487-2015-slides02.pdf) (January 7)
  3. Design of symmetric key cryptosystems (http:../../wiki/images/d/d0/CO487-2015-slides03.pdf) (January 9)
  4. Data Encryption Standard (http:../../wiki/images/6/61/CO487-2015-slides04.pdf) (January 12)
  5. Advanced Encryption Standard (http:../../wiki/images/e/e0/CO487-2015-slides05.pdf) (January 14)
    • AES animation (http://www.formaestudio.com/rijndaelinspector/archivos/Rijndael_Animation_v4_eng.swf) by Enrique Zabala
  6. Security definitions for symmetric-key encryption (http:../../wiki/images/d/d5/CO487-2015-slides06.pdf) (January 16)
  7. Linear cryptanalysis (http:../../wiki/images/5/5d/CO487-2015-slides07.pdf) (January 19)
  8. Differential cryptanalysis (http:../../wiki/images/b/b2/CO487-2015-slides08.pdf) (January 23)
  9. Stream ciphers (http:../../wiki/images/7/70/CO487-2015-slides09.pdf) (January 26)
  10. Wireless (in)security (http:../../wiki/images/3/31/CO487-2015-slides10.pdf) (January 28)
  11. Hash functions (http:../../wiki/images/9/92/CO487-2015-slides11.pdf) (January 30)
  12. Finding collisions in hash functions (http:../../wiki/images/0/07/CO487-2015-slides12.pdf) (February 2)
  13. Collisions in iterated hash functions (http:../../wiki/images/f/fe/CO487-2015-slides13.pdf) (February 4)
  14. Exploiting hash collisions (http:../../wiki/images/9/91/CO487-2015-slides14.pdf) (Feburary 11)
  15. Cryptography and law (http:../../wiki/images/e/e4/CO487-2015-slides15.pdf) (Feburary 13)
  16. Message authentication codes (http:../../wiki/images/e/ee/CO487-2015-slides16.pdf) (Feburary 23)
  17. Hash-based MACs (http:../../wiki/images/f/fb/CO487-2015-slides17.pdf) (Feburary 25)
  18. Authenticated encryption (http:../../wiki/images/9/91/CO487-2015-slides18.pdf) (February 27)
  19. Public-key cryptography (http:../../wiki/images/f/f0/CO487-2015-slides19.pdf) (March 2)
  20. RSA encryption (http:../../wiki/images/8/8c/CO487-2015-slides20.pdf) (March 4)
  21. Security definitions for public-key encryption (http:../../wiki/images/5/51/CO487-2015-slides21.pdf) (March 6)
  22. Diffie-Hellman and Elgamal (http:../../wiki/images/2/24/CO487-2015-slides22.pdf) (March 9)
  23. Hybrid encryption (http:../../wiki/images/1/14/CO487-2015-slides23.pdf) (March 11)
  24. Computational complexity (http:../../wiki/images/8/89/CO487-2015-slides24.pdf) (March 13)
  25. Digital signatures (http:../../wiki/images/a/ab/CO487-2015-slides25.pdf) (March 18)
  26. Elliptic curve cryptography (http:../../wiki/images/4/4f/CO487-2015-slides26.pdf) (March 20)
  27. Public-key infrastructure (http:../../wiki/images/7/73/CO487-2015-slides27.pdf) (March 23)
  28. Bitcoin (http:../../wiki/images/4/40/CO487-2015-slides28.pdf) (March 25)
  29. Side-channel attacks (http:../../wiki/images/5/57/CO487-2015-slides29.pdf) (March 27)
  30. Hardware implementations (http:../../wiki/images/b/bc/CO487-2015-slides30.pdf) (March 30)
  31. Quantum cryptography (http:../../wiki/images/f/f6/CO487-2015-slides31.pdf) (April 1)