Classes start on January 17, 2017

Date Topic Reading Notes
Wed, Jan 18 Course Overview
CMU Computing Policy
CMU Policy on Academic Integrity
notes
Symmetric Key Cryptography
Fri, Jan 20 Recitation 01: Discrete Probability Theory notes
Mon, Jan 23 Stream Ciphers KL 29-40, 61-77 notes
Wed, Jan 25 Stream Ciphers II KL 159-187 notes
Fri, Jan 27 Recitation 02: PRNG and Semantic Security Review (Guest lecturer: Kyle Soska)
Homework 1 out
notes
Mon, Jan 30 Stream Ciphers III KL 82-85, 86-90 notes
Wed, Feb 1 Block Ciphers KL 94-102 notes
Fri, Feb 3 Recitation 03: Asymptotic Security and Cryptographic Design notes
Mon, Feb 6 Using Block Ciphers KL 111-126 notes
Wed, Feb 8 Using Block Ciphers II
Message Integrity
KL 127-143 notes
notes
Fri, Feb 10 Recitation 04: Reduction Proofs notes
Mon, Feb 13 Message Integrity II
Collision Resistance
Homework 1 due (extended)
Homework 2 out
KL 148-154 notes
notes
Wed, Feb 15 Collision Resistance II
Authenticated Encryption
notes
notes
Public Key Cryptography
Fri, Feb 17 Recitation 05: Homework 1 Review
Mon, Feb 20 Authenticated Encryption II
Basic Key Exchange
KL 359-363 notes
notes
Wed, Feb 22 Basic Key Exchange II
Introduction to Number Theory
KL Ch. 7 notes
notes
Fri, Feb 24 Recitation 06: Number Theoretic Symmetric Key Constructions notes
Mon, Feb 27 Introduction to Number Theory II
Homework 2 due
Homework 3 out
KL 315-339, 364-368 notes
Wed, Mar 1 Public Key Encryption from Trapdoor Permutations notes
Fri, Mar 3 Recitation 07: Algebraic Structures and Algorithms in Number Theory notes
Mon, Mar 6 Public Key Encryption from Trapdoor Permutations II
Public Key Encryption: Diffie-Hellman
KL 421-432 notes

notes
Wed, Mar 8 Publik Key Encryption: Diffie-Hellman II
Digital Signatures I
KL 432-453 notes
Fri, Mar 10 No Recitation: Mid Semester Break
Homework 3 due
Mon, Mar 13 No Class: Spring Break
Wed, Mar 15 No Class: Spring Break
Fri, Mar 17 No Recitation: Spring Break
Mon, Mar 20 Digital Signatures II
Homework 4 out
notes
Protocols and Advanced Topics
Wed, Mar 22 Authentication and key Exchange: Kerberos + IPSec Just Fast Keying
Optional: Kerberos V5 Network Authentication Service
notes
notes
Fri, Mar 24 Recitation 08: Homework 2 review
Mon, Mar 27 Authentication on the Web: SSL/TLS TLS v1.2 RFC notes
Wed, Mar 29 Authentication on the Web: Password Security Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords
Naturally Rehearsing Passwords
The science of guessing: analyzing an anonymized corpus of 70 million passwords
notes
Fri, Mar 31 Recitation 09: Homework 3 review
Mon, Apr 3 Authentication on the Web: Accountable Public Key Infrastructure
Homework 4 due
Certificate Transparency notes
Wed, Apr 5 Mini Project: Generating Rogue Certificate via Finding Hash Collision
Mini Project out
Z3 Theorem Prover
SHA-2 (Secure Hash Algorithm 2)
Rogue Certificate
notes
Fri, Apr 7 Recitation 10: Homework 4 review
Mon, Apr 10 Accountability: Electronic Voting Verifiability, Privacy and Coercion-Resistance
Scantegrity II
Proving Coercion-Resistance of Scantegrity II
notes
notes
Wed, Apr 12 Accountability in Anonymous Communication / DC-Nets Untraceable Electronic Mail
The Dining Cryptographers Problem
Tor: The Second-Generation Onion Router
notes
Fri, Apr 14 Recitation 11: Homework 4 review (continued)
Mon, Apr 17 Anti-Surveillance: Security of Symmetric and Big Key Encryption against Mass Surveillance Security of Symmetric Encryption against Mass Surveillance
The Moral Character of Cryptographic Work [pg 31-]
notes
Wed, Apr 19 Anti-Surveillance: Anonymous Credentials and Private Information Retrieval
Homework 5 out
Pseudonym Systems [pg 7-24]
Private Information Retrieval
notes
notes
Fri, Apr 21 No Recitation: Carnival
Mini Project due (extended)
Mon, Apr 24 Anti-Surveillance: Riposte
(Guest lecturer: Henry Corrigan-Gibbs)
Riposte: An Anonymous Messaging System Handling Millions of Users
Wed, Apr 26 Elliptic Curve Cryptography Elliptic Curve Cryptography: a gentle introduction notes
Fri, Apr 28 Recitation 12: Elliptic Curve Cryptography (location moved to BH A53)
Mon, May 1 Cryptocurrencies
Homework 5 due
How the Bitcoin protocol actually works
Research Persectives and Challenges for Bitcoin and Cryptocurrencies
notes
Wed, May 3 Course Wrap-up notes
Fri, May 5 Recitation 13: Homework 5 review (location moved to BH A53)

* All schedules are subject to change over the course.