-
Notifications
You must be signed in to change notification settings - Fork 38
Fall 2018 Syllabus
Dates are subject to radical & arbitrary change. Reading assignments are due prior to beginning of the subsequent class.
-
Jonathan Katz, Yehuda Lindell: Modern Cryptography
-
Ross Anderson: Security Engineering (PDFs available online)
-
Optional Reference: Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography (PDFs available online)
-
Class Piazza: https://piazza.com/class/jjztfe90qacw3
-
Turn in assignments via Blackboard
- Written homework assignments (15% of grade, see grading notes below)
- Programming assignments (35% of grade)
- Two in-class midterm exams (40% of grade, combined)
- Class participation (10% of grade)
Written assignments will be graded probabilistically. This means that not all homework questions will be graded, but specific (student, problem number) pairs will be selected using a cryptographically-secure pseudorandom number generator. Your overall homework grade will be based on the grades for these questions, and only these questions.
There is no scheduled final exam for this course. Examinations will include two in class midterm exams. However: at the instructor's sole discretion one of the in-class midterm exams may be substituted for a final exam (during the scheduled exam period). This will be announced during the second half of the semester. Thus, students are expected to maintain availability to take the final exam during the scheduled finals period, unless the instructor excuses them.
Except where explicitly noted, all assignments are to be completed individually by students. You are bound by the CS academic integrity code.
- NOTE THE SPECIAL THURSDAY CLASS TIME
- Assignment 1 handed out (via Blackboard)
- Reading: Anderson (Security Engineering), Chapter entitled Cryptography: Sections on Symmetric Crypto Primitives (5.4 in online version)
- Reading (supplementary, optional): Handbook of Applied Cryptography, chapter entitled "Block Ciphers".
- Reading: Anderson (Security Engineering), Chapter entitled �Cryptography: Asymmetric Crypto Primitives� (5.7 in online version).
- Reading (supplementary, optional): Handbook of Applied Cryptography, chapter entitled "Public Key Encryption".
- Reading: Twenty Years of Attacks on RSA
- Reading: Imperfect Forward Secrecy
- Assignment 2 handed out on 9/20 (via Blackboard)
- Reading: Mining your Ps and Qs
- Reading: Borisov, Goldberg, Brewer Off-the-Record Communication
- Assignment 2 out
- Reading: Anderson, Physical Tamper Resistance
- Reading: Kocher, Timing attack on RSA & DL systems
- Reading: Bernstein, Cache timing attacks on AES
- Optional (http://courses.csail.mit.edu/6.857/2006/handouts/TimingAttacks.pdf)
- Reading: Bardou et al., Efficient Padding Oracle Attacks on Cryptographic Hardware
- Reading (optional): Remote Timing Attacks are Practical](https://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf)
- Reading: Spectre Paper
- Optional: Foreshadow
- Koblitz, Menezes: Another Look at Provable Security
- Optional Reading: Checkoway et al. A systematic analysis of the Juniper Dual EC incident
- Biondi, Desclaux: Silver Needle in the Skype (2006, REing of Skype binary)
- Reading: Kohno: Breaking and Repairing SSH