1 |
Introduction |
|
2 |
Security Mechanisms and Principles |
Problem set 1 Out |
3 |
Encryption, Perfect Secrecy, One-Time Pad |
|
4 |
Cryptographic Hash Functions |
|
5 |
Hashing Applications and Constructions |
|
6 |
Bitcoin |
Problem set 1 Due, Problem set 2 Out |
7 |
Secret Sharing |
|
8 |
Block Ciphers |
|
9 |
Block Cipher Modes |
|
10 |
Message Authentication Codes |
Problem set 2 Due, Project Ideas Due, Problem set 3 Out |
11 |
Prime Finding and other "Crypto" Math |
|
12 |
Diffie-Hellman Key Exchange and Crypto Groups |
|
13 |
Pedersen Commitment, PK Encryption, DDH |
Project Draft Due |
14 |
Malleability of El Gamal, IND-CCA2 |
Problem set 3 Due, Problem set 4 Out |
15 |
Digital Signatures |
|
16 |
DSA, Gap Groups |
Project Progress Review |
17 |
Gap Groups, Bilinear Maps, and Applications |
|
18 |
Zero-Knowledge Proofs |
Problem set 4 Due |
19 |
No Lecture (Quiz) |
Quiz |
20 |
Security of Voting |
Problem set 5 Out, Project Progress Review |
21 |
Security of Voting (cont.) |
|
22 |
Project Presentations |
|
23 |
Project Presentations (cont.) |
Problem set 5 Due |
24 |
Project Presentations (cont.) |
|
25 |
Project Presentations (cont.) |
|
26 |
No Class |
Final Project Due |