Monroe Hall 113

Email: arkady@gwu.edu

Office: SEH4570

Office hours: Monday 10:00-11:30, Wednesday 3:00-4:30

Grader: Jiawen Wang

Email: vermouth@gwu.edu

Midterm Exam | 25% |

Final Exam | 25% |

Homework | 40% |

Class participation / quizzes | 10% |

Homeworks will be assigned approximately every two weeks. Homeworks are due
before class (by 12:45PM) on the due date. They must be submitted via
Blackboard by this time to receive
credit. Homeworks can be typed using your favorite tool (I am happy to help
anybody interested in learning LaTex) or handwritten and scanned. But, make
sure that what you submit is legible as it is what will be graded. **No late
homeworks will be accepted!**

Students are welcome to work together on homeworks, however each student must write up and submit their own solutions. If you work on the homework with someone else, you MUST acknowledge them on your submitted homework. Additionally, you are welcome to use outside resources (e.g., web search, other text books, lecture notes) to help with the homework. However, if you use any such resources, you MUST cite them appropriately. Submitted homeworks violating these guidelines will be considered in breach of the academic integrity code.

There will be 6-7 homework assigments over the course of the semester. The final homework grade will be the average of all homework scores with the lowest score dropped.

Date | Lecture Topic(s) | Reading | HW Out | HW Due | Quiz |

Aug. 27 | Probability and asymptotics review, principles of modern cryptography, perfect secrecy and the one-time pad | A.2, 3.1.2, A.3, 1.2, 1.4, 2.1-2.2 | HW0,HW1 | Quiz 1 | |

Sep. 3 | Labor day: no class | HW0 due | |||

Sep. 10 | Proof of security of the one-time pad, computationally-secure encryption, proofs by reduction, pseudorandom generators and security of PRG+OTP encryption | 2.2, 2.3, 3.2, 3.2.1, 3.3 | HW2 | HW1 due | Quiz 2 |

Sep. 17 | Review of PRG and computationally-secure encryption, CPA security, pseudorandom functions, construction of CPA-secure encryption | 3.4, 3.5 | |||

Sep. 24 | CCA-secure encryption, modes of operation, padding oracle attack | 3.6, 3.7 | HW2 due | Quiz 3 | |

Oct. 1 | Message authentication codes definitions and constructions, CBC-MAC, authenticated encryption, hash function definitions and applications | 4.1-4.5, 5.1, 5.6 | HW3 | Quiz 4 | |

Oct. 8 | Fall break: no class | ||||

Oct. 15 | Hash functions and birthday attack, domain extension for hash functions, MACs from hash functions, review for midterm | 5.2, 5.3, 5.4.1 | HW3 due | ||

Oct. 22 | Exam (in class) | ||||

Oct. 29 | Practical constructions of symmetric-key primitives, DES, 3DES, AES, Feistel networks | 6.2, 6.3 | HW4 | ||

Nov. 5 | Number theory, group theory, cryptographic assumptions | 8.1, 8.2, 8.3.1, 8.3.2, 8.4.2 | Midterm 1 due | ||

Nov. 12 | Key exchange, Public-key encryption, Diffie-Hellman, El Gamal | 10, 11.1, 11.2.1, 11.4.1, 8.3.3 | HW5 | HW4 due | |

Nov. 19 | RSA, Key encapsulation, CCA security, RSA-OAEP | ||||

Nov. 26 | Digital signatures, Hash-and-sign, Fiat-Shamir transform and Schnorr signatures, DSA | HW5 due | |||

Dec. 3 | Advanced topic I | ||||

Dec. 10 | Exam 2 |