Description

This course introduces the science and art behind the design, security analysis, and implementation of modern day cryptosystems that protect privacy and authenticity of data at rest, in transit, and during use. We will see how cryptosystems evolved to withstand systems-level threats and mathematical cryptanalysis.

General Information

Meeting times
This class meets Tuesdays and Thursdays at 5:00-6:15pm in room PHO 211.

All registered students should also attend one of the recitation sections in MCS B23 on Friday at 11:15am-12:05pm, 12:20-1:10pm, or 1:25-2:15pm.
VPN information
Some of the textbooks and reading assignments require access to the websites of publishers like Springer, IEEE, and ACM. You will only be able to access these papers if you are on the BU network or if you VPN into it. Instructions to VPN into the BU network are located here: http://www.bu.edu/tech/services/support/remote/vpn/. Alternatively, prepending "http://ezproxy.bu.edu/login?url=" to the front of a URL allows you to view a single website through the BU network without the need to VPN.

Announcements

Course schedule
1/20/19 10:41 PM

This post will be continually updated as new readings and assignments are posted.

Part 1. Protecting data at rest

WeekTopicTextbook readingDiscussion?Lab?
1Unpredictability YesLab 1 due 1/28
2Block ciphers YesLab 2 due 2/4
3Message authentication

A Graduate Course in Applied Cryptography, read chapter 6 through the end of 6.4.1 (pages 212-226).

Yes. (Change of plans: no required reading.)Lab 3 due 2/11
4Encryption via enciphering

Introduction to Modern Cryptography, Sections 4.1 through 4.7.

YesLab 4 due 2/18
5(Test on February 21)The Block Cipher Companion, Sections 4.1 through 4.4 and also Sec 4.6. Everything here should be review except for CFB and OFB modes (Sec 4.2.1 and 4.2.2); just ignore those.NoNone

Part 2. Attacking data at rest

WeekTopicReadingDiscussion?Lab?
6Side channel attacks

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Yes. Read the required reading assignment beforehand.Lab 5 due 3/8
7Authenticated encryptionA Graduate Course in Applied Cryptography, Sections 9.1-9.6.No. Enjoy your spring break!(Still Lab 5)

Part 3. Protecting data in transit

WeekTopicReadingDiscussion?Lab?
8Authenticated key exchange YesLab 6 due 3/25
9Key evolution
  • Itkis' survey on Forward security
  • EFF blog post on security, privacy, and anonymity properties one might want in a messaging system
Yes. Read beforehand pages 1-9 and 29-32 of Rogaway's The Moral Character of Cryptographic Work.Lab 7 due 4/1

Part 4. Crypto law and policy

WeekTopicReadingDiscussion?Lab?
10Encryption and law

Orin Kerr's Computer Crime Law. Read chapter 1.

YesLab 8 due 4/8
11Crypto and privacyCohen and Park, Compelled Decryption and the Fifth Amendment. Read sections 1-4.NoLab 9 due 4/15

Part 5. Final topics

WeekTopicReadingDiscussion?Lab?
12Protecting passwords

The Hash Function BLAKE, Sections 1.1, 2.1, 2.2, and 2.4.

YesLab 10 due 4/24
13Cryptanalysis YesLab 11 due 5/1
14Protecting data while computingFuller et al. Cryptographically protected database searchNo

#pin

Staff Office Hours
NameOffice Hours
Omar Sagga
When?
Where?
Mayank Varia
When?
Where?
Nicolas Alhaddad
When?
Where?