CIS5371 - Cryptography - Fall 2024 - Schedule

DateTopicResourcesHomework
Week 18/27Logistics. Odd problems in cryptography: the dating problem, telephone coin flipping. Review of probability theory. Logistics   Slide 0 Scribe 1
8/29Review of probability theory, continued.  Scribe 1
Week 29/3Exercise 1. Introduction to classical crypto (Caesar cipher, shift cipher, substitution cipher)Slide 1
9/5No class (Tung's out of town). 
Week 39/10Breaking substitution cipher via Monte Carlo. Perfect secrecy and one-time pad. Slide 1Writing exercise
Hw1 is up
9/12Exercise 2. Wrap up one-time pad and perfect secrecy. Slide 1
Week 49/17Blockcipher: key recovery, DES, Double encryption and meet-in-the-middle attack, 3DES, advanced meet-in-the-middle attack for 3DES2, AES.Slide 2Writing exercise due
9/19Writing workshop. Quiz 1. 
    Week 5     9/24Exercise 3PRF: definition and attacks on some bad constructionsSlide 3
     9/26Campus closed. 
Week 610/1PRF: reduction proof (PRF security => KR security). Exercises on breaking PRF security. Birthday attack. Slide 3
10/3Encryption: ECB, CBC with ciphertext stealing, CTR. Semantic security (left-or-right, real-or-random). Slide 4Hw1 due (10/4)
Week 710/8Exercise 4Streamcipher: LFSR, a case study of DVD encryption Slide 4
10/10Quiz 2Exercise 5. DVD encrypion, continued, streamcipher from blockcipher Slide 4Hw2 is up
Week 810/15Review of Hw1.  Message Authentication Code: definition, CBC-MAC and attack, Encrypted CBC-MAC.Slide 5
10/17 MAC, continued: Carter-Wegman paradigm, reduction proofs.Slide 5
   Week 9    10/22Quiz 3Attack on CBC-MAC variant. Slide 5
10/24Authenticated encryption: definition, bad examples from CBC and WEP, generic compositionSlide 6Hw2 due (10/25)
Week 1010/29Quiz 4. Attacks on bad implementation of EtM.Slide 6
10/31Padding-oracle attack. Slide 6      Scribe 2Hw3 is up
Week 1111/5Quiz 5Review of Hw2.
11/7Exercise 6. Hash function: motivation applications, collision-resistance, ROM, extension attack on Merkle-Damgard.  Slide 7
Week 1211/12 Hash function: HMAC, compression function with Davies-Meyer,  Floyd's cycle detection, Password hashing, Merkle treeSlide 7
11/14Exercise 7. Asymmetric crypto: Diffie-Hellman key exchange, number-theoretic basics. Slide 8Hw3 due 
Week 1311/19Hw4 is up
11/21Quiz 6.
Week 1411/26
11/28No class (Thanksgiving)
Week 1512/3
12/5Hw3 due (12/06)