| LEC # | TOPICS | KEY DATES |
|---|---|---|
| 1 | Introduction | |
| 2 | User Authentication Overview, Passwords, Hashing | |
| 3 | Hash Functions | PS 1 Out |
| 4 | More Hashing Applications, Unconditional Security | |
| 5 | Unconditional Security | PS 1 Due |
| 6 | Block Ciphers, Modes of Operation | |
| 7 | Intro to Number-Theoretic Crypto | PS 2 Due PS 3 Out |
| 8 | GCD and Modular Inverses, Generators, Discrete Logs, Diffie-Hellman Key Exchange, El Gamal Encryption and Signatures | |
| 9 | RSA, Chosen-Ciphertext Attacks, RSA-OAEP | PS 3 Due PS 4 Out |
| 10 | Cramer-Shoup, Commitment Schemes | |
| 11 | Quiz 1 | |
| 12 | Key Agreement | |
| 13 | SSL, IBS, IBE and Secret Sharing | PS 4 Due |
| 14 | Secret Sharing | |
| 15 | Zero-Knowledge | Project Proposal Due Midterm Out |
| 16 | Watermarking and Fingerprinting (Guest Lecture) | |
| 17 | Tamper Resistance and Disk Forensics | Midterm Due PS 5 Out |
| 18 | Physical Security: Physical Uncloneable Functions, TEMPEST | |
| 19 | Self-Referential Programs, Viruses, Buffer Overflow Attacks | PS 5 Due PS 6 Out |
| 20 | More on Viruses | PS 6 Due |
| 21 | Trusted Computing (NGSCB aka Palladium; TCPA) | |
| 22 | Trusted Computing, Java Security, Biometrics | |
| 23 | Quiz 2, Concluding Remarks | |
| 24 | Talks | |
| 25 | Talks | |
| 26 | Talks | Written Term Projects Due Last Day of Classes |




