Week | Topics | Study Materials | Materials |
1 |
Overview of cryptography
The one-time pad and perfect secrecy
|
|
|
2 |
Pseudorandom generators (PRGs)
Semantic security
|
|
|
3 |
Symmetric encryption
Stream cipher constructions
|
|
|
4 |
Block cipher modes of operation (CTR, CBC, ECB)
Block cipher constructions (3DES and AES)
|
|
|
5 |
Public Key Cryptography
RSA, factoring problem
Weakness of RSA textbook version
|
|
|
6 |
ElGamal encryption Security Definitions: Chosen-plaintext security (CPA-security) Chosen-ciphertext security (CCA-security)
|
|
|
9 |
Key exchange
Diffie-Hellman key exchange
Discrete log, CDH, and DDH
|
|
|
10 |
Pseudorandom generators (PRGs) Semantic security
|
|
|
11 |
Hash Functions
Message authentication codes (MACs)
Hash-based MACs: HMAC
|
|
|
12 |
Certificates and the public-key infrastructure (PKI)
Authenticated key-exchange protocols: constructions and attacks
Transport Layer Security (TLS)
|
|
|
13 |
Cryptography Applications
Introduction to Multiparty Computation
Fully Homomorphic Encryption
Real-life scenarios
|
|
|
14 |
Private Information Retrieval (PIR)
|
|
|