|
|
|
|
Lecture Slides
|
(Please note that access to lecture notes is restricted.)
- Lecture 1
(PDF)
(6-up PDF)
(Jan 12, 2015)
- administrative stuff, hw1
- Lecture 2
(PDF)
(6-up PDF)
(Jan 14, 2015)
- hw1, introduction, background
- (Jan 19, 2015) - MLK holiday
- Lecture 3
(PDF)
(6-up PDF)
(Jan 21, 2015)
- background, cryptographic concepts (part 1)
- Lecture 4
(PDF)
(6-up PDF)
(Jan 26, 2015)
- cryptographic concepts (part 1), cryptographic concepts (part 2)
- Lecture 5
(PDF)
(6-up PDF)
(Jan 28, 2015)
- hw2, cryptographic concepts (part 2)
- Lecture 6
(PDF)
(6-up PDF)
(Feb 2, 2015)
- cryptographic concepts (part 2)
- Lecture 7
(PDF)
(6-up PDF)
(Feb 4, 2015)
- cryptographic concepts (parts 2 & 3), classical ciphers and cryptanalysis
- Lecture 8
(PDF)
(6-up PDF)
(Feb 9, 2015)
- classical ciphers and cryptanalysis
- Lecture 9
(PDF)
(6-up PDF)
(Feb 11, 2015)
- hw4, block ciphers
- (Feb 16, 2015) - presidents day holiday
- Lecture 10
(PDF)
(6-up PDF)
(Feb 18, 2015)
- block ciphers
- Lecture 11
(PDF)
(6-up PDF)
(Feb 23, 2015)
- DES
- Lecture 12
(PDF)
(6-up PDF)
(Feb 25, 2015)
- DES, math background for AES
- Lecture 13
(PDF)
(6-up PDF)
(Mar 2, 2015)
- math background for AES, AES
- Lecture 14
(PDF)
(6-up PDF)
(Mar 4, 2015)
- AES
- Lecture 15
(PDF)
(6-up PDF)
(Mar 9, 2015)
- AES, generating prime numbers (part 1)
- (Mar 11, 2015) - midterm exam
- (Mar 16, 2015) - spring break
- (Mar 18, 2015) - spring break
- Lecture 16
(PDF)
(6-up PDF)
(Mar 23, 2015)
- generating prime numbers (parts 1 & 2)
- Lecture 17
(PDF)
(6-up PDF)
(Mar 25, 2015)
- generating prime numbers (part 2), public-key cryptography (part 1)
- Lecture 18
(PDF)
(6-up PDF)
(Mar 30, 2015)
- public-key cryptography (parts 1 & 2)
- Lecture 19
(PDF)
(6-up PDF)
(Apr 1, 2015)
- public-key cryptography (part 2), pseudorandom generators
- Lecture 20
(PDF)
(6-up PDF)
(Apr 6, 2015)
- pseudorandom generators, stream ciphers (part 1)
- Lecture 21
(PDF)
(6-up PDF)
(Apr 8, 2015)
- stream ciphers (parts 1 & 2)
- Lecture 22
(PDF)
(6-up PDF)
(Apr 13, 2015)
- stream ciphers (part 2), hash functions (part 1)
- Lecture 23
(PDF)
(6-up PDF)
(Apr 15, 2015)
- hash functions (parts 1 & 2)
- Lecture 24
(PDF)
(6-up PDF)
(Apr 20, 2015)
- hash functions (part 2), digital signatures (parts 1 & 2)
- Lecture 25
(PDF)
(6-up PDF)
(Apr 22, 2015)
- introduction to cryptographic protocols, identification and entity authentication
- Lecture 26
(PDF)
(6-up PDF)
(Apr 27, 2015)
- identification and entity authentication
- Lecture 27
(PDF)
(6-up PDF)
(Apr 29, 2015)
- identification and entity authentication, basic cryptographic protocol
Preview:
- (May 8, 2015) - final exam (firm)
|
|
Tentative Slides
|
The following are tentative slides (in PDF format) for this semester.
- Administrative
(PDF)
(6-up PDF)
- HW1
(PDF)
(6-up PDF)
- Introduction
(PDF)
(6-up PDF)
- Background
(PDF)
(6-up PDF)
- Overview of Cryptography (HAC Ch 1)
- HW2
(PDF)
(6-up PDF)
- HW4
(PDF)
(6-up PDF)
- Block Ciphers (HAC Ch 7)
- Public-key Parameters (HAC Ch 4)
- Public-key Encryption (HAC Ch 3 & 8)
- Pseudorandom Bits and Sequences (HAC Ch 5)
- Stream Ciphers (HAC Ch 6)
- Hash Functions and Data Integrity (HAC Ch 9)
- Digital Signatures (HAC Ch 11)
- Cryptographic Protocols (HAC Ch 10, 12, & 13)
|
|
|