**Announcements.**

**Our class.**
A mailing list for everyone who has been
attending.

**Meetings.**
Our course meets M 6:10-9:00 pm in 1062 Bainer.
Office hours are F 10-11, or by appointment, or by no appointment.
If you miss a class, or if you didn't understand a class,
you can go watch the video tape in 1101 Hart.
More course information
is available.

**Class notes.**
These notes will evolve "just in time" (updates made Monday or Tuesday
corresponding to that Monday's lecture).
So save a tree and don't print things out in advance of
the class on the corresponding topic.
If my notes are ready in time, I'll bring copies to class.

**Problem sets and their solutions.**
The problems are found in the class notes above.
Note that "Exercise" is distinct from "Problem".

- PS #1: Problems 1.1, 1.2; Exercise 2.4.
*Assigned Oct 1, Due Oct 15* - PS #2: Exercise 3.2, Problem 3.3.
*Assigned Oct 8, Due Oct 15* - PS #1,2 solns
- PS #3: Problems 3.6, 3.7, 3.8.
*Assigned Oct 22, due Oct 29.* - PS #3 solns
- PS #4: Problems 4.2, 4.3.
*Assigned Oct 29, due Nov 14.* - PS #5: Problems A, 6.1, 6.2.
*Assigned Nov 5, due Nov 14.* - PS #6: Exercises 5.1, 5.2; Problem 6.4.
*Assigned Nov 14; due Nov 26.*

**Lectures to date.**
This used to have only a list of lecture topics, but I've added in my notes.
They're really intended only for me; here is a little disclaimer about them.

- Lect 1 - Oct 1 - Introduction. Block ciphers.
- Lect 2 - Oct 8 - PRPs and PRFs, part 1.
- Lect 3 - Oct 15 - PRPs and PRFs, part 2. PRGs.
- Lect 4 - Oct 22 - OWFs. Symmetric encryption, part 1 (notions) .
- Lect 5 - Oct 29 - Symmetric encryption, part 2 (relations, attacks, achieving it).
- Lect 6 - Nov 5 - Symmetric encryption, part 3 (cbc$ analysis). MACs.
- Lect 7 - Nov 14 - MACs, part 2. (Short class due to fire alarm)
- Lect 8 - Nov 19 - MACs, part 3. Authenticated encryption.
- Lect 9 - Nov 26 - Number theory. Public-key encryption.

**Supplemental material.** Begin by
reading the class notes. If you yearn for more, here are some
suggestions.

- Mihir Bellare's survey: Practice-Oriented Provable Security
- Oded Goldreich's essay: The Foundations of Cryptography
- Menezes, van Oorschot and Vanstone's book, Handbook of Applied Cryptography
- DES (FIPS 46-3) and an article on DES by Susan Landau
- The draft AES FIPS from the AES homepage, and an article on AES by Susan Landau.
- Some modes of operation
- [Bellare, Desai, Jokippi, Rogaway] paper about symmetric encryption.
- SHA1 Definition
- HMAC Spec and the HMAC papers
- [Bellare, Namprempre] paper about authenticated encryption, and my authenticated encryption scheme

Phil Rogaway's homepage