Lecture | Date | Topic | Recommended reading |
---|---|---|---|
1 | 20.08 | Introduction to cryptography, historical ciphers, perfect privacy, one-time pad, probability theory | Chapter 1 + 2 in [BR] |
2 | 27.08 | Block ciphers, PRF/PRPs, AES | Chapter 3 + 4 in [BR] (4.8-4.10 can be skipped) |
3 | 03.09 | Symmetric encryption, IND-CPA, CTR/CBC-mode | Chapter 5 in [BR] (5.6+5.8 can be skipped) |
4 | 10.09 | MACs, UF-CMA, CBC-MAC, CMAC | Chapter 7 in [BR] (7.8 can be skipped) |
5 | 17.09 | Authenticated encryption, IND-CCA, AEAD, GCM-mode | [Note on authenticated encryption] |
6 | 24.09 | Hash functions, SHA1/SHA2, HMAC | Chapter 6 + Appendix A (birthday problem) in [BR], Chapter 11 [PP] |
7 | 01.10 | Randomness and entropy, random number generators, PRNGs, stream ciphers |
https://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/ https://blog.cr.yp.to/20170723-random.html |
8 | 08.10 | Group theory, Diffie-Hellman key exchange | Chapter 9 + 10.1-10.2 in [BR] (9.4 can be skipped) |
9 | 15.10 | Diffie-Hellman II, elliptic curves, computational aspects | Chapter 8 + 9 in [PP] (8.5 can be skipped) |
10 | 22.10 | KEMs, IND-CPA/IND-CCA, ElGamal | |
11 | 29.10 | Digital signatures, UF-CMA, Schnorr, PKI |
Chapter 12 in [BR] (12.3.6 can be skipped)
|
12 | 05.11 | Quantum computers, Shor's algorithm |
Watch the following videos: How Quantum Computers Break The Internet... Starting Now minutephysics: |
13 | 12.11 | LWE, ML-KEM | |
14 | 19.11 | SIS, ML-DSA | |
15 | 26.11 | Course recap |
[BR] Mihir Bellare and Phillip Rogaway. Introduction to Modern Cryptography. 2005.
[PP] Christof Paar and Jan Pelzl. Understanding Cryptography - A Textbook for Students and Practitioners. Springer, 2010.