ECS 227 — Winter 2012 — List of Lecture Topics |
|||
---|---|---|---|
Lecture | Topic | ||
Week 1 | Lect 01 - T 1/10 | Please fill in the grid for week-2 makeup. The idea of “provable security” and reductions. Defining PRGs. | |
Lect 02 - R 1/12 | Increasing the “stretch” of a PRG. One-way functions. Sample cryptographic problems: privacy, authenticity, OT, coin flipping. | ||
Week 3 | Lect 03 - T 1/24 | One-time pads and two notions of perfect privacy. Hybrid arguments, abstractly. The blockcipher DES. | |
Lect 04 - R 1/26 | More blockciphers: sha1, Threefish, AES, subset cipher. Making a PRG from a blockcipher. PRPs are close to PRFs? | ||
Lect 05 - F 1/27 | Makeup lecture. The PRP/PRF Switching Lemma. The game-playing technique. | ||
Week 4 | Lect 06 - T 1/31 | PS#1 solutions, part 1. Blockcipher modes of operation. Syntax of a sym enc schemes. Real-or-random definition. | |
Lect 07 - R 2/02 | Notions of security for a sym enc scheme: ind$, ind, lr. Implications and separations. | ||
Lect 08 - F 2/03 | Makeup lecture. Discuss projects. The fg-notion for a sym enc scheme. Implications. | ||
Week 5 | Lect 09 - T 2/07 | The sem notion of security. Implicatations. IND$ Security of CTR mode. | |
Lect 10 - R 2/09 | COCl2 (yikes). IND$ security of CBC$. What IND-CPA doesn’t buy you: nonmalleability, chosen-ciphertext security. | ||
Week 6 | Lect 11 - T 2/14 | Definitions for nonmalleability, INC-CCA, and authenticity/AE. Lifting encryption-scheme definitions to the public-key setting. | |
Lect 12 - R 2/16 | More notions for PK encryption security. DH key exchange. ElGamal encryption. DL, CDH, DDH. | ||
Week 7 | Lect 13 - T 2/21 | The RO model. Hashed ElGamal is secure under CDH in the ROM. Trapdoor permutations. RSA as a trapdoor permutation. | |
Lect 14 - R 2/23 | Provably-secure encryption with RSA: the lsb is hardcore. The Goldreich-Levin hardcore bit. Enc by f(r)||G(r)+M and OAEP. | ||
Week 8 | Lect 15 - T 2/28 | Solns to two homework problems. Defns for digital signature. Why Raw RSA sigs don’t work. FDH and its ROM security. | |
Lect 16 - R 3/01 | The PSS signature scheme. Lamport and Merkle signatures. Definition of MAC security. Secure PRFs are secure MACs. | ||
Week 9 | Lect 17 - T 3/06 | CBC MAC. CMAC. Carter-Wegman MACs. How to make universal hash functions. UMAC. HMAC. Authenticated encryption. | |
Lect 18 - R 3/08 | Authenticated encryption. Adding redundancy. Generic composition methods. Tweakable blockciphers and OCB. | ||
Week A | Lect 19 - T 3/13 | Student presentations: p1 (Katrina), p2 (Ryan), p3 (Andrew H), p4 (Shizhuo) | |
Lect 20 - R 3/15 | Student presentations: p5 (Robert), p6 (Michael), p7 (Andrew A), p8 (Zhige) | ||
Week B | Lect X - T 3/20 | 10:30 am - 12:00 pm Student presentations: p9 (James), p10 (Sisi), p11 (Julia) |