Cryptography

CSc 48000–Spring 2024

The City College of CUNY
Department of Computer Science

Instructor: Prof. Nelly Fazio
Lectures: Tu/Th, 2:00–3:15pm, Shepard Hall 275
Office hours: T/Th, 12:30–1:30pm or by appointment, SH-279
Email: nfazio AT ccny DOT cuny DOT edu [Put CSc480 in Subject line]


[ Course Description | List of Topics | Textbook | Grading | CUNY Academic Integrity Policy | Weekly Schedule ]


Course Description

This course covers the theoretical foundations of modern cryptography. Emphasis will be placed on precise definitions, rigorous proof techniques, and analysis of the relations among the various cryptographic primitives. List of topics includes: computational security, cryptographic hash functions, private-key encryption, message authentication codes, public-key encryption, digital signatures, commitment schemes. No previous knowledge of cryptography is required. However, general ease with algorithms and elementary probability theory, and maturity with mathematical proofs will be assumed.

Prerequisites: CSC 22000, CSC 30400, and (CSC 21700 or EE 31100)

List of Topics

Recommended Textbook

Grading

NOTE: There will be NO make-up or substitute exams!

CUNY Academic Integrity Policy

Cheating will not be tolerated. If you cheat, you risk losing your position as a student in the department and the college. CUNY policy on academic integrity can be found here. Failure to understand and follow these rules will constitute cheating, and will be dealt with as per university guidelines.

Weekly Schedule (tentative)

Lecture Date Topic
1 Jan 25 Introduction to Cryptography. Information-Theoretic Setting.
2 Jan 30 Introduction to the Computational Setting.
3 Feb 1 Brush-up on Number Theory.
4 Feb 6 Hash Functions. Applications: Fingerprinting.
5 Feb 8 Commitment Schemes.
6 Feb 13 Snow Day: Review of security definitions for symmetric encryption schemes.
7 Feb 15 Review of Number Theory concepts. Examples.
8 Feb 20 Symmetric Encryption: Block ciphers and Modes of Operation.
  Feb 22 No class! Monday schedule.
9 Feb 27 Data Integrity: Message Authentication Protocols.
10 Feb 29 The key distribution problem. Merkle puzzles. Diffie-Hellman Key Exchange.
11 Mar 5 Asymmetric Encryption Schemes. ElGamal encryption scheme.
RSA encryption and padding schemes (OAEP,OAEP+)
12 Mar 7 Digital Signatures. Lamport's one-time signature scheme.
RSA signature scheme. Schnorr signature scheme.
Signature schemes for multiple messages: "chain-based" signatures and "tree-based" signatures
13 Mar 12 Review
14 Mar 14 Midterm Exam.
? Final Exam, 2:00—3:15pm, Shepard Hall 275

Copyright © Nelly Fazio