



Lecture Slides

(Please note that access to lecture notes is restricted.)
 Lecture 1
(PDF)
(6up PDF)
(Jan 13, 2009)
 administrative stuff, hw1
 Lecture 2
(PDF)
(6up PDF)
(Jan 15, 2009)
 introduction to security
 Lecture 3
(PDF)
(6up PDF)
(Jan 20, 2009)
 introduction to security, secretkey cryptography (steganography,
permutation and substitution ciphers)
 Lecture 4
(PDF)
(6up PDF)
(Jan 22, 2009)
 secretkey cryptography (symmetrickey and publickey ciphers,
stream ciphers, onetime pad, RC4, block ciphers,
key space vs. permutation space)
 Lecture 5
(PDF)
(6up PDF)
(Jan 27, 2009)
 secretkey cryptography (cryptanalysis, attacks, DES)
 Lecture 6
(PDF)
(6up PDF)
(Jan 29, 2009)
 secretkey cryptography (DES, modes of operations), hw2
 Lecture 7
(PDF)
(6up PDF)
(Feb 3, 2009)
 secretkey cryptography (DES varients, AES), publickey cryptography
 Lecture 8
(PDF)
(6up PDF)
(Feb 5, 2009)
 publickey cryptography (RSA, extended Euclidean algorithm, table method)
 Lecture 9
(PDF)
(6up PDF)
(Feb 10, 2009)
 publickey cryptography (other), digital signatures and
cryptographic hash functions
 Lecture 10
(PDF)
(6up PDF)
(Feb 12, 2009)
 cryptographic hash functions, onetime digital signatures
 Lecture 11
(PDF)
(6up PDF)
(Feb 17, 2009)
 Merkle's onetime digital signatures, basic cryptographic protocols
(key exchange, authentication)
 Lecture 12
(PDF)
(6up PDF)
(Feb 19, 2009)
 basic cryptographic protocols (multiplekey publickey cryptography,
secret splitting, secret sharing)
 Lecture 13
(PDF)
(6up PDF)
(Feb 24, 2009)
 hw3
 Lecture 14
(PDF)
(6up PDF)
(Feb 26, 2009)
 intermediate cryptographic protocols (bit commitment, fair coin flips,
timestamping, subliminal channel, ElGamal signature)
 Lecture 15
(PDF)
(6up PDF)
(Mar 3, 2009)
 intermediate cryptographic protocols (ElGamal signature,
undeniable signature and other digital signature schemes,
computing with encrypted data, oneway accumulators)
 (Mar 5, 2009)  midterm exam
 Lecture 16
(PDF)
(6up PDF)
(Mar 10, 2009)
 intermediate cryptographic protocols (oneway accumulators,
key escrow), advanced cryptographic protocols (zero knowledge proofs,
blind signatures)
 Lecture 17
(PDF)
(6up PDF)
(Mar 12, 2009)
 hw4, termpaper
 (Mar 17, 2009)  spring break
 (Mar 19, 2009)  spring break
 Lecture 18
(PDF)
(6up PDF)
(Mar 24, 2009)
 advanced cryptographic protocols (blind signatures, IDbased PKC,
oblivious transfer, simultaneous contract signing),
esoteric cryptographic protocols (secure multiparty computation,
secure election)
 Lecture 19
(PDF)
(6up PDF)
(Mar 26, 2009)
 esoteric cryptographic protocols (secure election, digital cash,
anonymous message broadcast), key management
 Lecture 20
(PDF)
(6up PDF)
(Mar 31, 2009)
 key management
 Lecture 21
(PDF)
(6up PDF)
(Apr 2, 2009)
 key management, key management issues
 Lecture 22
(PDF)
(6up PDF)
(Apr 7, 2009)
 application of security  bistro
 Lecture 23
(PDF)
(6up PDF)
(Apr 9, 2009)
 hw5, key management issues
 Lecture 24
(PDF)
(6up PDF)
(Apr 14, 2009)
 group key management
 Lecture 25
(PDF)
(6up PDF)
(Apr 16, 2009)
 group key management, authentication
 Lecture 26
(PDF)
(6up PDF)
(Apr 21, 2009)
 authentication, authentication in applications
 Lecture 27
(PDF)
(6up PDF)
(Apr 23, 2009)
 authentication in applications
 Lecture 28
(PDF)
(6up PDF)
(Apr 28, 2009)
 authentication in applications, authorization
 Lecture 29
(PDF)
(6up PDF)
(Apr 30, 2009)
 authorization, intrusion detection, wireless
Preview:
 (May 12, 2009)  final exam (firm)


Tentative Slides

The following are tentative slides (in PDF format) for this semester.
They are subject to change without notice.
 Administrative
 Assignmentsrelated
 Introduction
 Cryptography
 secretkey cryptography
(steganography, transposition and substitution ciphers,
stream ciphers, onetime pad, block ciphers, DES, AES)
(PDF)
(6up PDF)
 publickey cryptography
(RSA, extended Euclidean algorithm, DiffieHellman, ElGamal)
(PDF)
(6up PDF)
 digital signatures and cryptographic hash functions
(PDF)
(6up PDF)
 Cryptographic Protocols
 basic cryptographic protocols
(key exchange, authentication, multiplekey publickey cryptography,
secret splitting, secret sharing)
(PDF)
(6up PDF)
 intermediate cryptographic protocols
(bit commitment, fair coin flips, timestamping, subliminal channel,
ElGamal signature,
undeniable signature and other digital signature schemes,
computing with encrypted data, oneway accumulators, key escrow)
(PDF)
(6up PDF)
 advanced cryptographic protocols
(zero knowledge proofs, blind signatures, IDbased PKC,
oblivious transfer, simultaneous contract signing)
(PDF)
(6up PDF)
 esoteric cryptographic protocols
(secure multiparty computation, secure election, digital cash,
anonymous message broadcast)
(PDF)
(6up PDF)
 Key Management
 ,Authentication
 Authorization
 Intrusion Detection
 Wireless
 Privacy (skipped for this semester)
 Special Topics


