## CSci 4509 Cryptographic Protocols: Syllabus

[Home] [Syllabus] [Assignments] [Resources]

## Syllabus

The syllabus will be updated throughout the semester. Dates, topics, assigned reading, and problem set due dates will be added or might change. All changes in assigned reading and due dates will be announced in class (and occasionally by e-mail). While I will do my best to update the web site accordingly, it is a student's responsibility to keep track of the problem set due dates and reading assignments. If you are not sure about due dates, please don't hesitate to ask.

Reading assignments are listed for the day when the material is first explained in class. You may read ahead the material ahead of the lecture or after, either way is fine.

Reading material is denoted Sch for Schneier textbook and St for Stinson. See the index page for a complete reference.

Tuesday Thursday
Week 1: January 18 -- January 21
Introduction, course overview, terminology, brief description of crypotographic problems. Reading: Sch 1.1. Symmetric key cryptography. Basic ciphers and their cryptoanalysis. Reading: St Chapter 1.
Week 2: January 24 -- January 28
Symmetric key cryptography. Basic ciphers and their cryptoanalysis (cont.)
Problem set 1 posted, due Thursday, Feb 10
Symmetric key cryptography. Basic ciphers and their cryptoanalysis (cont.)
Week 3: January 31 -- February 1
Combining basic ciphers: Substitution-Permutation Networks, DES, AES. Reading: Sch Ch. 9, 12, St Ch. 3. Combining basic ciphers: Substitution-Permutation Networks, DES, AES (cont.)
Week 4: February 7 -- February 11
Combining basic ciphers: Substitution-Permutation Networks, DES, AES (cont.) Combining basic ciphers: Substitution-Permutation Networks, DES, AES (cont.)
Problem set 1 due
Problem set 2 posted. Due Monday, Feb. 28
Week 5: February 14 -- February 18
Combining basic ciphers: Substitution-Permutation Networks, DES, AES (cont.)
DES, AES. Block cipher modes. Reading: Sch. 9.
Week 6: February 21 -- February 25
Block cipher modes. Hash functions, MAC
Week 7: February 28 -- March 4
Review for the midterm.
Problem set 2 due
Midterm exam.
Week 8: March 7 -- March 11
Hash functions: Random Oracle Model. Attacks on hash functions.
Reading: St. 4, Sch. Ch. 18, St Ch. 4.
Hash functions for plaintext of arbitrary length.
March 14 -- March 18: SPRING BREAK, NO CLASSES
Week 9: March 21 -- March 25
Hash functions: SHA-1. Message Authentication codes.
Problem set 3 posted. Due Tuesday, April 5
Public key system. RSA.
Week 10: March 28 -- April 1
RSA (cont.) Overview of other public key systems. Use of public key cryptography for digital signatures.
Reading: St Ch. 7, Sch Ch. 20.
Week 11: April 4 -- April 8
Digital signatures and certificates.
Problem set 3 due
Problem set 4 posted. Due Tuesday, April 19
Key exchange and authentication protocols.
Week 12: April 11 -- April 15
Key exchange and authentication protocols; SSL.
Secret sharing.
Week 13: April 18 -- April 22
Zero knowledge protocols.
Problem set 4 due
Problem set 5 posted. Due Tuesday, May 3
Electronic money.
Week 14: April 25 -- April 29
Selected protocols (TBA) Selected protocols (TBA)
Week 15: May 2 -- May 6
Discussion: real-life issues.
Problem set 5 due
Review for the final exam.
Final exam: 11am - 1pm Tuesday, May 10th

The views and opinions expressed in this page are strictly those of the page author. The contents of this page have not been reviewed or approved by the University of Minnesota.