Description
General Information
Announcements
This post will be continually updated as new textbook reading and homework assignments are posted.
Part 1. Protecting data confidentiality at rest
Week | Topic | Reading | Homework |
1 | Unpredictability |
The Block Cipher Companion, Chapter 1 Encryption & Regulation, a short blog post summarizing the types of crypto we will consider and some of the laws/regulations that impact it | HW 1, due 1/27 |
2 | Block ciphers |
Serious Cryptography, Chapter 4 (pages 1-13) Read or (better) listen to NPR's Planet Money episode 773 about pseudorandomness gone wrong | HW 2, due 2/3 |
3 | Encryption via enciphering |
Serious Cryptography, Chapter 4 (pages 13-23) | HW 3, due 2/10 |
Part 2. Attacking data confidentiality at rest
Week | Topic | Reading | Homework |
4 | Side channel attacks | Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices | HW 4, due 2/18 |
5 | (Test on February 20) | The Block Cipher Companion, Sections 4.1 through 4.3 (everything here should be review except for CFB and OFB modes in Sec 4.2.1 and 4.2.2, which you should ignore) | None |
Part 3. Adding data integrity
Week | Topic | Reading | Homework |
6 | Hash functions and MACs |
The Hash Function BLAKE, Sections 2.1, 2.2, and 2.4 The Block Cipher Companion, Section 4.4 Optional: Real-World Cryptography, Chapter 2 | HW 5, due 3/2 |
7 | Authenticated encryption | The Block Cipher Companion, Section 4.5 | HW 6, due 3/18 |
Part 4. Protecting data in transit
Week | Topic | Reading | Homework |
8 | Authenticated key exchange |
Cryptography Made Simple, Sections 18.1-18.4.3, pages 369-385 | HW 7, due 3/25 |
9 | Signal's key ratcheting | HW 8, due 4/1 |
Part 5. Protecting data during use
Week | Topic | Reading | Homework |
10 | Protecting general computation |
Secure Multiparty Computation for Privacy-Preserving Data Mining, Section 3 Optional: Secure Multiparty Computation (MPC) | HW 9, due 4/8 |
11 | Protecting location, databases |
Cryptographically Protected Database Search Optional: Anonymous Collocation Discovery | none |
12 | Protecting voting | none [project due 4/22] |
Part 6. Final topics
Week | Topic | Reading | Homework |
13 | Cipher design and cryptanalysis |
The Block Cipher Companion, Section 6.1 (and optionally also 7.1) | HW 10, due 4/29 |
14 | Crypto and the law | Optional: Orin Kerr's Computer Crime Law, Chapter 1 | None |
#pin
Name | Office Hours | |
---|---|---|
Mayank Varia | When? Where? | |
Harrison Richmond | When? Where? | |
Elyse Kaczmarek | When? Where? | |
Xinyuan Zhang | When? Where? | |
Nicolas Alhaddad | When? Where? |