| 1 |
Introduction |
|
| 2 |
Security Mechanisms and Principles |
Problem set 1 Out |
| 3 |
Encryption, Perfect Secrecy, One-Time Pad |
|
| 4 |
Cryptographic Hash Functions |
|
| 5 |
Hashing Applications and Constructions |
|
| 6 |
Bitcoin |
Problem set 1 Due, Problem set 2 Out |
| 7 |
Secret Sharing |
|
| 8 |
Block Ciphers |
|
| 9 |
Block Cipher Modes |
|
| 10 |
Message Authentication Codes |
Problem set 2 Due, Project Ideas Due, Problem set 3 Out |
| 11 |
Prime Finding and other "Crypto" Math |
|
| 12 |
Diffie-Hellman Key Exchange and Crypto Groups |
|
| 13 |
Pedersen Commitment, PK Encryption, DDH |
Project Draft Due |
| 14 |
Malleability of El Gamal, IND-CCA2 |
Problem set 3 Due, Problem set 4 Out |
| 15 |
Digital Signatures |
|
| 16 |
DSA, Gap Groups |
Project Progress Review |
| 17 |
Gap Groups, Bilinear Maps, and Applications |
|
| 18 |
Zero-Knowledge Proofs |
Problem set 4 Due |
| 19 |
No Lecture (Quiz) |
Quiz |
| 20 |
Security of Voting |
Problem set 5 Out, Project Progress Review |
| 21 |
Security of Voting (cont.) |
|
| 22 |
Project Presentations |
|
| 23 |
Project Presentations (cont.) |
Problem set 5 Due |
| 24 |
Project Presentations (cont.) |
|
| 25 |
Project Presentations (cont.) |
|
| 26 |
No Class |
Final Project Due |