This plan will change through the semester.
Chapter numbers refer to Stinson, except where marked. HAC is the Handbook of Applied Cryptography.
Week | Topic | Key words | Chapters | Exercise |
---|---|---|---|---|
34 | How to agree on and use a secret | Diffie-Hellman, classical ciphers, perfect security | 11.2, 1.1, 1.2, 2.3 | |
35 | Classical ciphers, simple cryptanalysis, modern block ciphers, stream ciphers | 1.1, 1.2, 3.1, 3.2, 3.6, HAC 4.5 | ||
36 | Modern ciphers, integrity | 3.7, 4.4, 4.5 | ||
37 | How to break DH | Pohlig-Hellman. | 6.2 | |
38 | Baby-step-Giant-step, Pollard's rho. Finite fields, index calculus. | 6.2, 6.3 | ||
39 | Primality testing. | 5.4 | ||
40 | Elliptic curves | 6.5 | ||
41 | Elliptic curves | 6.5 | ||
42 | Public key encryption | ElGamal/RSA | 5.1, 6.1, 6.7, 5.3 | |
43 | RSA, Pollard's rho and p-1, Index calculus for factoring | 5.5-5.9 | ||
44 | Hash functions | Collisions, preimages, second preimages, iterated hash functions | 4.1-4.3 | |
45 | Digital signatures | RSA | 7.1-7.2, 7.5.2 | |
46 | Schnorr signatures and zero knowledge. | 7.4.1 | ||
47 | Summary |