Assignment 7 (due Wednesday December 7 at 5 PM) and the solutions to Assignment 5 posted.
OT and Secure Computation
Wednesday, November 30, 2011
Monday, November 28, 2011
Wednesday, November 23, 2011
Monday, November 21, 2011
Lecture 27
Friday, November 18, 2011
Lecture 26
Assignment 6 (due Wed Nov 30) and Assignment 4 solutions posted.
Shamir Secret Sharing, Homomorphic Encryption
Shamir Secret Sharing, Homomorphic Encryption
Wednesday, November 16, 2011
Monday, November 14, 2011
Friday, November 11, 2011
Wednesday, November 9, 2011
Monday, November 7, 2011
Friday, November 4, 2011
Lecture 20
Digital Signatures, Collision-Resistant Hash Functions, El Gamal Scheme
Sections 4.6.1, 12.3.2, 12.4
Sections 4.6.1, 12.3.2, 12.4
Wednesday, November 2, 2011
Lecture 19
El-Gamal Encryption, Digital Signatures, Textbook RSA signatures
Sections 10.5, 12.1-12.3.1
Sections 10.5, 12.1-12.3.1
Monday, October 31, 2011
Friday, October 28, 2011
Lecture 17
Assignment 2 solutions posted.
Intel's New Random-Number Generator
Problems with "Textbook RSA" Section 10.4.1
Intel's New Random-Number Generator
Problems with "Textbook RSA" Section 10.4.1
Wednesday, October 26, 2011
Lecture 16
Lecture by Arefin Huq
* Definition and discussion of CDH and DDH (from 7.3.2)
* Choosing a Random Group Element (B.2.4)
* Finding a Generator of a Cyclic Group (B.3)
* Baby-Step/Giant Step Algorithm (8.2.1)
* overview of Pohlig-Hellman Algorithm (8.2.2)
* Definition and discussion of CDH and DDH (from 7.3.2)
* Choosing a Random Group Element (B.2.4)
* Finding a Generator of a Cyclic Group (B.3)
* Baby-Step/Giant Step Algorithm (8.2.1)
* overview of Pohlig-Hellman Algorithm (8.2.2)
Monday, October 24, 2011
Friday, October 21, 2011
Lecture 14
Lecturer: Arefin Huq
Wednesday, October 19, 2011
Lecture 13
Assignment 3 has been posted and is due Friday, October 28.
Public-Key Encryptions, Chosen-Plaintext Attacks and Multiple Message Encryptions
Textbook 10.1-10.2
Public-Key Encryptions, Chosen-Plaintext Attacks and Multiple Message Encryptions
Textbook 10.1-10.2
Monday, October 17, 2011
Friday, October 14, 2011
Wednesday, October 12, 2011
Lecture 10
Assignment 1 solutions posted.
Chosen Ciphertext Attacks Section 3.7
Introduction to Public Key Crypto
Math Background Section 7.1.4
Chosen Ciphertext Attacks Section 3.7
Introduction to Public Key Crypto
Math Background Section 7.1.4
Monday, October 10, 2011
Friday, October 7, 2011
Lecture 8
Indistinguishable encryptions in the presence of an eavesdropper from a pseudorandom generator.
Sections 3.4.1-3.4.2
Chosen Plaintext Attacks
Section 3.5
Sections 3.4.1-3.4.2
Chosen Plaintext Attacks
Section 3.5
Wednesday, October 5, 2011
Lecture 7
Lecture by Arefin Huq
Modular Arithmetic and Exponentiation
Chapter 7 through Section 7.1.2 and Appendix B through Section B.2.3
Modular Arithmetic and Exponentiation
Chapter 7 through Section 7.1.2 and Appendix B through Section B.2.3
Monday, October 3, 2011
Lecture 6
Pseudorandom generators
Textbook Section 3.3
Upcoming Seminars
Tuesday Craig Mundie (Microsoft Research Chief) Converging Worlds: The New Era of Computing
Thursday Frontiers in Computer Science Symposium
Textbook Section 3.3
Upcoming Seminars
Tuesday Craig Mundie (Microsoft Research Chief) Converging Worlds: The New Era of Computing
Thursday Frontiers in Computer Science Symposium
Friday, September 30, 2011
Lecture 5
Implications of indistinguishable encryptions in the presence of an eavesdropper.
Textbook Section 3.2.2
Textbook Section 3.2.2
Wednesday, September 28, 2011
Lecture 4
Instructions for finding Assignment 1 are on the assignments page. Due Friday October 7th.
Formal definition of indistinguishable encryptions in the presence of an eavesdropper. Textbook section 3.1-3.2.1.
Formal definition of indistinguishable encryptions in the presence of an eavesdropper. Textbook section 3.1-3.2.1.
Monday, September 26, 2011
Friday, September 23, 2011
Wednesday, September 21, 2011
Lecture 1
Introduction of class, overview of non-modern cryptography and basic principles of modern crypto.
Textbook Chapter 1
Complexity Vidcast - Bill's Enigma
Textbook Chapter 1
Complexity Vidcast - Bill's Enigma
Monday, May 23, 2011
Course Information
EECS 395/495-0-21: Introduction to Cryptography
Fall 2011
Lecturer: Lance Fortnow
Grader: Arefin Huq
Lectures: MWF 1:00-1:50 in Tech LG66
For undergraduate CS majors this course can be used for either the Theory or Security depth requirement.
Description:
Lecturer: Lance Fortnow
Grader: Arefin Huq
Lectures: MWF 1:00-1:50 in Tech LG66
For undergraduate CS majors this course can be used for either the Theory or Security depth requirement.
Description:
This course will give a broad overview of cryptographic techniques with an emphasis on modern tools based on prime numbers. We discuss many basic protocols from classical tools to DES, RSA and discrete logarithms and applications such as digital signatures, secure protocols, secret sharing, secure computation and zero-knowledge proofs. As time permits we will explore connections between cryptography, coding theory and quantum mechanics.
This course is designed for advanced undergraduates and graduate students. There are no official prerequisites but math knowledge of the level of Discrete Math (EECS 310) will be assumed. There will be no programming in the course.
Textbook: Modern Cryptography by Katz and Lindell. Errata
This course is designed for advanced undergraduates and graduate students. There are no official prerequisites but math knowledge of the level of Discrete Math (EECS 310) will be assumed. There will be no programming in the course.
Textbook: Modern Cryptography by Katz and Lindell. Errata
Subscribe to:
Posts (Atom)