Introduction to Cryptography
About this course
This course provides you with accessible introduction to modern cryptography including symmetric key encryption, public and private key encryption, and cryptographic applications.
Textbooks
Jonathan Katz and Yehuda Lindell, "Introduction to Modern Cryptography, 2nd Ed.," Champion & Hall/CRC, 2015.
Schedule
Slot | Topic | Reading |
1 | Introduction | Chapter 1 |
2 | Perfect secrecy | Chapter 2 |
3 | Private-key cryptography | Chapters 3 |
4 | Private-key cryptography (Cont.) | Chapters 3 |
5 | Message authentication codes | Chapters 4.1~4.5 |
6 | Hash functions | Chapters 5.1~5.5 |
7 | Practical construction of private-key primitives | Chapters 6.1 and 6.2 |
8 | Midterm | N/A |
9 | Public-key cryptography | Chapters 8.1 |
10 | Public-key cryptography (Cont.) | Chapters 11.1~11.3 and 11.5 |
11 | Discrete logarithm | Chapters 8.3.1-8.3.3 and 11.4 |
12 | Digital signatures | Chapters 12.1~12.5 |
13 | Authentication protocols | N/A |
14 | Cryptographic protocols (Cont.) | N/A |
15 | Zero-knowledge proof systems | N/A |
Copyright (C) 2009-2016 Kazuya Sakai, All Right Received.