Lecture | Date | Topic | Recommended reading |
---|---|---|---|
1 | 28.08 | Introduction to cryptography, historical ciphers, perfect privacy, one-time pad, probability theory | Chapter 1 + 2 in [BR] |
2 | 04.09 | Block ciphers, PRF/PRPs, AES | Chapter 3 + 4 in [BR] (4.8-4.10 can be skipped) |
3 | 11.09 | Symmetric encryption, IND-CPA, CTR/CBC-mode | Chapter 5 in [BR] (5.6+5.8 can be skipped) |
4 | 18.09 | MACs, UF-CMA, CBC-MAC, CMAC | Chapter 7 in [BR] (7.8 can be skipped) |
5 | 25.09 | Authenticated encryption, IND-CCA, AEAD, GCM-mode | [Note on authenticated encryption] |
6 | 02.10 | Hash functions, SHA1/SHA2, HMAC | Chapter 6 + Appendix A (birthday problem) in [BR], Chapter 11 [PP] |
7 | 09.10 | Randomness and entropy, random number generators, PRNGs, stream ciphers |
https://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/ https://blog.cr.yp.to/20170723-random.html |
8 | 16.10 | Group theory, Diffie-Hellman key exchange | Chapter 9 + 10.1-10.2 in [BR] (9.4 can be skipped) |
9 | 23.10 | Diffie-Hellman II, elliptic curves, backdoors | Chapter 8 + 9 in [PP] (8.5 can be skipped) |
10 | 30.10 | Diffie-Hellman III, computational aspects, Signal/What's App/Signal | |
11 | 06.11 | Public-key encryption, IND-CPA, ElGamal | Chapter 11 in [BR], Chapter 7 in [PP] |
12 | 13.11 | Digital signatures, UF-CMA, Schnorr, RSA, Public-key infrastructure (PKI) | Chapter 12 in [BR] (12.3.6 can be skipped), Chapter 10 in [PP] (10.3 can be skipped) |
13 | 20.11 | Quantum computers, Shor's algorithm, post-quantum cryptography | TBD |
14 | 27.11 | Course recap |
[BR] Mihir Bellare and Phillip Rogaway. Introduction to Modern Cryptography. 2005.
[PP] Christof Paar and Jan Pelzl. Understanding Cryptography - A Textbook for Students and Practitioners. Springer, 2010.