CO 487: Applied Cryptography (Winter 2016)

Instructor: David Jao, djao@math, MC 5032
Office hours: Tue., Wed., Thurs. 2:00pm-3:00pm

Teaching assistants:

Edward Eaton eeaton MC 5481 Office hours: Thu. 12:00-1:00
Chris Leonardi cfoleona MC 5481 Office hours: Mon. 10:30-11:30
Vishnu Narayan vvnaraya MC 6011 Office hours: Wed. 11:30-12:30
Luis Ruiz-Lopez laruizlo MC 5129 Office hours: Tue. & Thu. 11:00-12:00
Randy Yee r7yee MC 5497 Office hours: Tue. 1:00-2:00

It is highly recommended that students join the Google+ community (https://plus.google.com/communities/112531518617711352585) for CO 487 to keep up to date with online discussions of assignment problems and administrative issues.

Course materials

Final exam information

Past final exams: 2015 (https:../../wiki/images/5/53/CO487-2016-final1.pdf), 2013 (https:../../wiki/images/4/46/CO487-2016-final2.pdf)

Midterm information

The midterm is a closed-book, no-calculator exam.

Schedule

The (tentative) schedule for the course is as follows:

Lectures

  1. Introduction to cryptography (https:../../wiki/images/2/27/CO487-2016-slides01.pdf) (January 4)
  2. Symmetric-key encryption (https:../../wiki/images/0/01/CO487-2016-slides02.pdf) (January 6)
  3. Security definitions for symmetric-key encryption (https:../../wiki/images/3/3a/CO487-2016-slides03.pdf) (January 8). Some (optional) links of interest:
  4. Block ciphers (https:../../wiki/images/3/35/CO487-2016-slides04.pdf) (January 11)
  5. Data Encryption Standard (https:../../wiki/images/6/65/CO487-2016-slides05.pdf) (January 13)
  6. Linear cryptanalysis (https:../../wiki/images/9/97/CO487-2016-slides06.pdf) (January 15)
  7. Differential cryptanalysis (https:../../wiki/images/b/b0/CO487-2016-slides07.pdf) (January 20)
  8. Cryptanalysis of DES (https:../../wiki/images/9/9d/CO487-2016-slides08.pdf) (January 22). Optional reading:
  9. Advanced Encryption Standard (https:../../wiki/images/d/d2/CO487-2016-slides09.pdf) (January 25)
  10. Block cipher modes of operation (https:../../wiki/images/d/dd/CO487-2016-slides10.pdf) (January 27)
  11. Hash functions (https:../../wiki/images/d/df/CO487-2016-slides11.pdf) (January 29)
  12. Iterated hash functions (https:../../wiki/images/7/74/CO487-2016-slides12.pdf) (February 1)
  13. Collisions in iterated hash functions (https:../../wiki/images/4/47/CO487-2016-slides13.pdf) (February 3)
  14. Message Authentication Codes (https:../../wiki/images/8/8f/CO487-2016-slides14.pdf) (February 5)
  15. Authenticated encryption (https:../../wiki/images/2/20/CO487-2016-slides15.pdf) (February 8)
  16. Applied cryptanalysis (https:../../wiki/images/a/a3/CO487-2016-slides16.pdf) (February 10)
  17. Cryptography, law, and society (https:../../wiki/images/f/ff/CO487-2016-slides17.pdf) (February 12)
  18. Introduction to public-key cryptography (https:../../wiki/images/d/db/CO487-2016-slides18.pdf) (February 26)
  19. RSA encryption (https:../../wiki/images/d/d3/CO487-2016-slides19.pdf) (February 29). Optional reading:
  20. Diffie-Hellman key exchange (https:../../wiki/images/8/83/CO487-2016-slides20.pdf) (March 2). Optional reading:
  21. Security definitions for public-key cryptography (https:../../wiki/images/2/23/CO487-2016-slides21.pdf) (March 4)
  22. Semantic security (https:../../wiki/images/2/2b/CO487-2016-slides22.pdf) (March 7)
  23. Probabilistic encryption (https:../../wiki/images/1/1c/CO487-2016-slides23.pdf) (March 9)
  24. Hybrid encryption (https:../../wiki/images/a/af/CO487-2016-slides24.pdf) (March 11)
  25. Elliptic curve cryptography (https:../../wiki/images/1/1a/CO487-2016-slides25.pdf) (March 14)
  26. Digital signatures (https:../../wiki/images/a/ab/CO487-2016-slides26.pdf) (March 16)
  27. Side-channel attacks (https:../../wiki/images/8/8e/CO487-2016-slides27.pdf) (March 18)
  28. Bitcoin (https:../../wiki/images/7/71/CO487-2016-slides28.pdf) (March 21). Optional reading:
  29. Quantum computation (https:../../wiki/images/b/b2/CO487-2016-slides29.pdf) (March 23)
  30. Quantum key distribution (https:../../wiki/images/4/49/CO487-2016-slides30.pdf) (March 28)
  31. Hardware implementations (https:../../wiki/images/c/c6/CO487-2016-slides31.pdf) (March 30)
  32. Post-quantum cryptography (April 1). No slides, but here are some useful links:
  33. Exam review (https:../../wiki/images/a/a4/CO487-2016-slides32.pdf) (April 4)