# Difference between revisions of "CS 8803TFC - Theoretical Foundations of Cryptography, Spring 2011"

(→Handouts and Lecture Notes) |
(→Handouts and Lecture Notes) |
||

(14 intermediate revisions by the same user not shown) | |||

Line 40: | Line 40: | ||

To use the supplied LaTeX templates (recommended), you will need the latest version of this [[Media:header.tex|header file]] (you may need to rename it to lower-case after downloading, due to a bug in the wiki software). You may also need [http://mirror.ctan.org/macros/latex/contrib/exam/exam.cls this file], if the template does not compile properly on its own. | To use the supplied LaTeX templates (recommended), you will need the latest version of this [[Media:header.tex|header file]] (you may need to rename it to lower-case after downloading, due to a bug in the wiki software). You may also need [http://mirror.ctan.org/macros/latex/contrib/exam/exam.cls this file], if the template does not compile properly on its own. | ||

− | * [[:Media:hw1.pdf|Homework 1]] (posted Jan 18): due Jan 27 ([[Media:hw1.tex|template]], [[:Media:header.tex|header file]]). | + | * [[:Media:hw1.pdf|Homework 1]] (posted Jan 18): due Jan 27 ([[:Media:hw1.tex|template]], [[:Media:header.tex|header file]]). |

− | * [[:Media:hw2.pdf|Homework 2]] (posted Jan 27): due Feb 10 ([[Media: | + | * [[:Media:hw2.pdf|Homework 2]] (posted Jan 27): due Feb 10 ([[:Media:hw2.tex|template]], [[:Media:header.tex|header file]]). |

+ | * [[:Media:hw3.pdf|Homework 3]] (posted Feb 10): due Feb 24 ([[:Media:hw3.tex|template]], [[:Media:header.tex|header file]]). | ||

+ | * [[:Media:hw4.pdf|Homework 4]] (posted Feb 24): due Mar 10 ([[:Media:hw4.tex|template]], [[:Media:header.tex|header file]]). | ||

+ | * [[:Media:hw5.pdf|Homework 5]] (posted Apr 5): due Apr 14 ([[:Media:hw5.tex|template]], [[:Media:header.tex|header file]]). | ||

== Handouts and Lecture Notes == | == Handouts and Lecture Notes == | ||

Line 49: | Line 52: | ||

* [[:Media:course-info.pdf|Course information and syllabus]] | * [[:Media:course-info.pdf|Course information and syllabus]] | ||

− | * [[:Media:lec1.pdf| | + | * [[:Media:lec1.pdf|Overview, Perfect Secrecy]] |

** Supplementary reading: Section 1.3 of Pass-shelat | ** Supplementary reading: Section 1.3 of Pass-shelat | ||

'''Computational Hardness''' | '''Computational Hardness''' | ||

− | * [[:Media:lec2.pdf| | + | * [[:Media:lec2.pdf|Limits of Perfect Secrecy, Computational Hardness]] |

** Supplementary reading: Sections 2.1-2.2 of Pass-shelat | ** Supplementary reading: Sections 2.1-2.2 of Pass-shelat | ||

− | * [[:Media:lec3.pdf| | + | * [[:Media:lec3.pdf|Candidate OWFs, Hardness Amplification]] |

** Supplementary reading: Sections 2.3-2.5 of Pass-shelat | ** Supplementary reading: Sections 2.3-2.5 of Pass-shelat | ||

− | * [[:Media:lec4.pdf| | + | * [[:Media:lec4.pdf|Number Theory, OWF Variants]] |

** Supplementary reading: Section 2.6-2.7 of Pass-shelat | ** Supplementary reading: Section 2.6-2.7 of Pass-shelat | ||

'''Indistinguishability and Pseudorandomness''' | '''Indistinguishability and Pseudorandomness''' | ||

− | * [[:Media:lec5.pdf| | + | * [[:Media:lec5.pdf|Indistinguishability, Pseudorandom Generators]] |

** Supplementary reading: Sections 3-3.3 of Pass-shelat | ** Supplementary reading: Sections 3-3.3 of Pass-shelat | ||

+ | |||

+ | * Blum-Micali PRG | ||

+ | ** Supplementary reading: Section 3.4 of Pass-shelat | ||

+ | |||

+ | * Goldreich-Levin Theorem | ||

+ | ** Supplementary reading: [http://www.eecs.berkeley.edu/~daw/cs276/l4.ps David Wagner's notes] and [http://cseweb.ucsd.edu/~mihir/papers/gl.pdf Mihir Bellare's notes] on GL | ||

+ | |||

+ | * [[:Media:lec8.pdf|Pseudorandom Functions]] | ||

+ | ** Supplementary reading: Section 3.8 of Pass-shelat | ||

+ | |||

+ | * [[:Media:lec9.pdf|Symmetric Encryption]] | ||

+ | ** Supplementary reading: Sections 3.5-3.7, 3.9 of Pass-shelat | ||

+ | |||

+ | * [[:Media:lec10.pdf|Asymmetric Encryption]] | ||

+ | ** Supplementary reading: Sections 3.10-3.11 of Pass-shelat | ||

'''Authentication''' | '''Authentication''' | ||

+ | |||

+ | * [[:Media:lec11.pdf|Message Authentication]] | ||

+ | ** Supplementary reading: Sections 5-5.2 of Pass-shelat | ||

+ | |||

+ | * [[:Media:lec12.pdf|CCA Security, Digital Signatures]] | ||

+ | ** Supplementary reading: Sections 5.3-5.4 of Pass-shelat | ||

+ | |||

+ | * [[:Media:lec13.pdf|Digital Signatures]] | ||

+ | ** Supplementary reading: Sections 5.5-5.7 of Pass-shelat | ||

+ | |||

+ | * [[:Media:lec14.pdf|Random Oracle Signatures]] | ||

+ | ** Supplementary reading: Sections 5.8 of Pass-shelat | ||

'''Zero Knowledge''' | '''Zero Knowledge''' | ||

+ | |||

+ | * [[:Media:lec15.pdf|Zero Knowledge, Interactive Proofs]] | ||

+ | ** Supplementary reading: Sections 4-4.5 of Pass-shelat | ||

+ | |||

+ | * [[:Media:lec16.pdf|ZK Proofs]] | ||

+ | ** Supplementary reading: Sections 4.5-4.6 of Pass-shelat | ||

+ | |||

+ | * [[:Media:lec17.pdf|ZK for NP]] | ||

+ | ** Supplementary reading: Section 4.7 of Pass-shelat | ||

+ | |||

+ | * [[:Media:lec18.pdf|Proofs of Knowledge]] | ||

'''Special Topics''' | '''Special Topics''' |

## Latest revision as of 18:00, 6 April 2011

## Course Information

**Instructor:** Chris Peikert

**Time:** Tue/Thu 3-4:30pm (First meeting: ~~Jan 11th~~ Jan 18th, due to weather)

**Location:** College of Computing Building, Room 102

**Summary:** Cryptography, or "secret writing," is nearly as old as
written communication itself. Yet only over the past few decades has
it grown from a "black art" into a true science with rigorous
mathematical foundations and methodologies. These have taken
cryptography far beyond its roots in simple secret codes, to a
discipline with far-reaching influence on computing as a whole.

This class is a graduate-level, *theory-oriented* introduction to
the foundations of modern cryptography. The emphasis is on essential
*concepts*, precise *models and definitions*, and *proof techniques*. Topics include: one-way functions and related
complexity assumptions, pseudorandomness, public-key and
identity-based crypto, zero knowledge and commitment, and connections
to diverse areas of computer science. As time permits, we may also
touch upon specialized topic areas such as secure multiparty
computation, private information retrieval, or lattice-based
cryptography.

For more information and course policies, see the course information and syllabus handout.

## Assignments

All assignments are due (via the course T-Square site) before the start of class on the stated due date.

To use the supplied LaTeX templates (recommended), you will need the latest version of this header file (you may need to rename it to lower-case after downloading, due to a bug in the wiki software). You may also need this file, if the template does not compile properly on its own.

- Homework 1 (posted Jan 18): due Jan 27 (template, header file).
- Homework 2 (posted Jan 27): due Feb 10 (template, header file).
- Homework 3 (posted Feb 10): due Feb 24 (template, header file).
- Homework 4 (posted Feb 24): due Mar 10 (template, header file).
- Homework 5 (posted Apr 5): due Apr 14 (template, header file).

## Handouts and Lecture Notes

**Intro and Perfect Secrecy**

- Overview, Perfect Secrecy
- Supplementary reading: Section 1.3 of Pass-shelat

**Computational Hardness**

- Limits of Perfect Secrecy, Computational Hardness
- Supplementary reading: Sections 2.1-2.2 of Pass-shelat

- Candidate OWFs, Hardness Amplification
- Supplementary reading: Sections 2.3-2.5 of Pass-shelat

- Number Theory, OWF Variants
- Supplementary reading: Section 2.6-2.7 of Pass-shelat

**Indistinguishability and Pseudorandomness**

- Indistinguishability, Pseudorandom Generators
- Supplementary reading: Sections 3-3.3 of Pass-shelat

- Blum-Micali PRG
- Supplementary reading: Section 3.4 of Pass-shelat

- Goldreich-Levin Theorem
- Supplementary reading: David Wagner's notes and Mihir Bellare's notes on GL

- Pseudorandom Functions
- Supplementary reading: Section 3.8 of Pass-shelat

- Symmetric Encryption
- Supplementary reading: Sections 3.5-3.7, 3.9 of Pass-shelat

- Asymmetric Encryption
- Supplementary reading: Sections 3.10-3.11 of Pass-shelat

**Authentication**

- Message Authentication
- Supplementary reading: Sections 5-5.2 of Pass-shelat

- CCA Security, Digital Signatures
- Supplementary reading: Sections 5.3-5.4 of Pass-shelat

- Digital Signatures
- Supplementary reading: Sections 5.5-5.7 of Pass-shelat

- Random Oracle Signatures
- Supplementary reading: Sections 5.8 of Pass-shelat

**Zero Knowledge**

- Zero Knowledge, Interactive Proofs
- Supplementary reading: Sections 4-4.5 of Pass-shelat

- ZK Proofs
- Supplementary reading: Sections 4.5-4.6 of Pass-shelat

- ZK for NP
- Supplementary reading: Section 4.7 of Pass-shelat

**Special Topics**

## Useful Links

- The Georgia Tech cryptography reading group.

- A Course in Cryptography, by Rafael Pass and abhi shelat (freely available notes)

- Boaz Barak's course at Princeton

- Salil Vadhan's course at Harvard

- Yevgeniy Dodis's course at NYU

- A Computational Introduction to Number Theory and Algebra, a book by Victor Shoup (freely available)

- A collection of good advice on reading and writing mathematical proofs.

- A free, very thorough introduction to LaTeX, and good style tips.

## Archive

Previous iterations of this course: