Discussion - 1.0 hours
Summary of Course Content
I. Overview. Sample cryptographic goals. The idea of provable security. Resources of cryptographic interest.
II. Block ciphers, pseudorandom function families, and pseudorandom permutation families.
III. Pseudorandom generators and one-way functions. Hard-core bits.
IV. Symmetric encryption: realizations and notions of security.
V. Asymmetric encryption. Number-theoretic background. The random-oracle paradigm.
VI. Message authentication. Connections to universal hashing.
VII. Digital signatures.
VIII. Uniform and non-uniform security. Asymptotic approaches.
IX. Interactive proofs. IP=PSPACE. Zero-knowledge. NP in zero-knowledge. Non-interactive zero-knowledge.
X. Entity authentication and session-key distribution.
XI. Secret-sharing schemes. Verifiable secret sharing. Key escrow.
XII. Secure function evaluation.
ABET Category Content:
Engineering Science: 4 units
Engineering Design: 0 unit
None; distributed lecture notes and selected papers from the literature.
Potential Course Overlap
This course does not have a significant overlap with any other course. Some classical cryptography (eg., RSA encryption) is covered in ECS 235, but that course has a very different emphasis, with no definitions or proofs.