|
|
|
|
Lecture Slides
|
(Please note that access to lecture notes is restricted.)
- Lecture 1
(PDF)
(6-up PDF)
(Jan 14, 2013)
- administrative stuff, hw1
- Lecture 2
(PDF)
(6-up PDF)
(Jan 16, 2013)
- hw1, introduction, cryptographic concepts (part 1)
- (Jan 21, 2013) - MLK holiday
- Lecture 3
(PDF)
(6-up PDF)
(Jan 23, 2013)
- cryptographic concepts (part 1)
- Lecture 4
(PDF)
(6-up PDF)
(Jan 28, 2013)
- cryptographic concepts (parts 1 & 2)
- Lecture 5
(PDF)
(6-up PDF)
(Jan 30, 2013)
- cryptographic concepts (part 2)
- Lecture 6
(PDF)
(6-up PDF)
(Feb 4, 2013)
- cryptographic concepts (part 2)
- Lecture 7
(PDF)
(6-up PDF)
(Feb 6, 2013)
- cryptographic concepts (parts 2 & 3)
- Lecture 8
(PDF)
(6-up PDF)
(Feb 11, 2013)
- cryptographic concepts (part 3)
- Lecture 9
(PDF)
(6-up PDF)
(Feb 13, 2013)
- hw4, classical ciphers and cryptanalysis
- (Feb 18, 2013) - presidents day holiday
- Lecture 10
(PDF)
(6-up PDF)
(Feb 20, 2013)
- classical ciphers and cryptanalysis
- Lecture 11
(PDF)
(6-up PDF)
(Feb 25, 2013)
- block ciphers
- Lecture 12
(PDF)
(6-up PDF)
(Feb 27, 2013)
- block ciphers, DES
- Lecture 13
(PDF)
(6-up PDF)
(Mar 4, 2013)
- DES
- Lecture 14
(PDF)
(6-up PDF)
(Mar 6, 2013)
- math background for AES
- Lecture 15
(PDF)
(6-up PDF)
(Mar 11, 2013)
- hw5, math background for AES, AES
- (Mar 13, 2013) - midterm exam
- (Mar 18, 2013) - spring break
- (Mar 20, 2013) - spring break
- Lecture 16
(PDF)
(6-up PDF)
(Mar 25, 2013)
- AES
- Lecture 17
(PDF)
(6-up PDF)
(Mar 27, 2013)
- AES
- Lecture 18
(PDF)
(6-up PDF)
(Apr 1, 2013)
- generating prime numbers (part 1)
- Lecture 19
(PDF)
(6-up PDF)
(Apr 3, 2013)
- generating prime numbers (parts 1 & 2)
- Lecture 20
(PDF)
(6-up PDF)
(Apr 8, 2013)
- generating prime numbers (part 2), public-key cryptography (part 1)
- Lecture 21
(PDF)
(6-up PDF)
(Apr 10, 2013)
- public-key cryptography (part 1)
- Lecture 22
(PDF)
(6-up PDF)
(Apr 15, 2013)
- public-key cryptography (parts 1 & 2), pseudorandom generators
- Lecture 23
(PDF)
(6-up PDF)
(Apr 17, 2013)
- pseudorandom generators
- Lecture 24
(PDF)
(6-up PDF)
(Apr 22, 2013)
- pseudorandom generators, stream ciphers (part 1)
- Lecture 25
(PDF)
(6-up PDF)
(Apr 24, 2013)
- stream ciphers (parts 1 & 2)
- Lecture 26
(PDF)
(6-up PDF)
(Apr 29, 2013)
- hash functions (parts 1 & 2).
- Lecture 27
(PDF)
(6-up PDF)
(May 1, 2013)
- hash functions (part 2).
Preview:
- (May 10, 2012) - final exam (firm)
|
|
Tentative Slides
|
The following are tentative slides (in PDF format) for this semester.
- Administrative
(PDF)
(6-up PDF)
- HW1
(PDF)
(6-up PDF)
- Introduction
(PDF)
(6-up PDF)
- Overview of Cryptography (HAC Ch 1)
- HW2
(PDF)
(6-up PDF)
- HW4
(PDF)
(6-up PDF)
- Block Ciphers (HAC Ch 7)
- Public-key Parameters (HAC Ch 4)
- Public-key Encryption (HAC Ch 3 & 8)
- Pseudorandom Bits and Sequences (HAC Ch 5)
- Stream Ciphers (HAC Ch 6)
- Hash Functions and Data Integrity (HAC Ch 9)
- Digital Signatures (HAC Ch 11) (skip)
|
|
|