Monroe Hall 113

Email: arkady@gwu.edu

Office: SEH4570

Office hours: Monday 10:00-11:30, Wednesday 3:00-4:30

Midterm Exam | 25% |

Final Exam | 25% |

Homework | 40% |

Class participation / quizzes | 10% |

Homeworks will be assigned approximately every two weeks. Homeworks are due
before class (by 12:45PM) on the due date. They must be submitted via
Blackboard by this time to receive
credit. Homeworks can be typed using your favorite tool (I am happy to help
anybody interested in learning LaTex) or handwritten and scanned. But, make
sure that what you submit is legible as it is what will be graded. **No late
homeworks will be accepted!**

Students are welcome to work together on homeworks, however each student must write up and submit their own solutions. If you work on the homework with someone else, you MUST acknowledge them on your submitted homework. Additionally, you are welcome to use outside resources (e.g., web search, other text books, lecture notes) to help with the homework. However, if you use any such resources, you MUST cite them appropriately. Submitted homeworks violating these guidelines will be considered in breach of the academic integrity code.

There will be 6-7 homework assigments over the course of the semester. The final homework grade will be the average of all homework scores with the lowest score dropped.

Date | Lecture Topic(s) | Reading | HW Out | HW Due |

Aug. 27 | Probability and asymptotics review, principles of modern cryptography, perfect secrecy and the one-time pad | A.2, 3.1.2, A.3, 1.2, 1.4, 2.1-2.2 | HW0,HW1 | |

Sep. 3 | Labor day: no class | HW0 due | ||

Sep. 10 | Proof of security of the one-time pad, computationally-secure encryption, proofs by reduction, pseudorandom generators and security of PRG+OTP encryption | 2.2,2.3,3.2,3.2.1,3.3 | HW2 | HW1 due |

Sep. 17 | CPA security, pseudorandom functions, construction of CPA-secure encryption, modes of operation, CCA-security and padding oracle attacks | |||

Sep. 24 | Message authentication codes definitions and constructions, CBC-MAC, authenticated encryption | HW2 due | ||

Oct. 1 | Hash functions, Merkle-Damgard transform, HMAC, attacks on hash functions, applications of hash functions, random oracle model | |||

Oct. 8 | Fall break: no class | |||

Oct. 15 | Practical constructions of symmetric-key primitives, DES, 3DES, AES, Feistel networks | |||

Oct. 22 | Exam (in class) | |||

Oct. 29 | Linear and differential cyptanalysis | |||

Nov. 5 | Number theory, group theory, cryptographic assumptions, key exchange | |||

Nov. 12 | Public-key encryption, El Gamal, RSA, key-encapsulation mechanisms | |||

Nov. 19 | CCA security, RSA-OAEP, CCA security in the ROM | |||

Nov. 16 | Digital signatures, Hash-and-sign, Fiat-Shamir transform and Schnorr signatures, DSA | |||

Dec. 3 | Advanced topic I | |||

Dec. 10 | Advanced topic II |