Lecture plan

Lecture Date Topic Recommended reading
1 20.08 Introduction to cryptography, historical ciphers, perfect privacy, one-time pad, probability theory Chapter 1 + 2 in [BR]
2 27.08 Block ciphers, PRF/PRPs, AES  Chapter 3 + 4  in [BR] (4.8-4.10 can be skipped) 
3 03.09 Symmetric encryption, IND-CPA, CTR/CBC-mode Chapter 5 in [BR] (5.6+5.8 can be skipped)
4 10.09 MACs, UF-CMA, CBC-MAC, CMAC Chapter 7 in [BR] (7.8 can be skipped)
5 17.09 Authenticated encryption, IND-CCA, AEAD, GCM-mode [Note on authenticated encryption]
6 24.09 Hash functions, SHA1/SHA2, HMAC Chapter 6 + Appendix A (birthday problem) in [BR], Chapter 11 [PP]
7 01.10 Randomness and entropy, random number generators, PRNGs, stream ciphers

https://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/

https://blog.cr.yp.to/20170723-random.html

8 08.10 Group theory, Diffie-Hellman key exchange Chapter 9 + 10.1-10.2 in [BR] (9.4 can be skipped)
9 15.10 Diffie-Hellman II, elliptic curves, computational aspects Chapter 8 + 9 in [PP] (8.5 can be skipped)
10 22.10 KEMs, IND-CPA/IND-CCA, ElGamal  
11 29.10 Digital signatures, UF-CMA, Schnorr, PKI

Chapter 12 in [BR] (12.3.6 can be skipped)

 

12 05.11 Quantum computers, Shor's algorithm

Watch the following videos:
Veritasium:

How Quantum Computers Break The Internet... Starting Now

minutephysics:

How Quantum Computers Break Encryption

13 12.11 LWE, ML-KEM  
14 19.11 SIS, ML-DSA  
15 26.11 Course recap  

[BR] Mihir Bellare and Phillip Rogaway. Introduction to Modern Cryptography. 2005.

[PP] Christof Paar and Jan Pelzl. Understanding Cryptography - A Textbook for Students and Practitioners. Springer, 2010.

Published Aug. 13, 2024 12:17 AM - Last modified June 11, 2025 3:39 PM