## CompSci.167: Applied Cryptography

## Winter 2018

##

This
course explains the inner working of cryptographic tools, the security
properties they are designed to achieve, how to reason about their security,
and how to properly use them. We will cover topics such as encryption (secret-key and
public-key), message authentication, user authentication, digital signatures,
key management, cryptographic hashing, network security protocols (SSL, IPsec),
and public-key infrastructure. Towards
the end of the class we will touch on a few advanced topics such as
zero-knowledge proofs and secure computation.

**Prerequisites:** The course is intended for
upper-level undergraduates, and we assume familiarity with algorithms (CS.161)
and discrete math (ICS.6B / ICS.6D).
Basic understanding of probability theory and modular arithmetic will be
helpful, although we will review relevant concepts as we need them.

## Class Discussions on Piazza

This term we will be using Piazza for class discussion. The system allows for getting you help fast and efficiently from classmates, the TA, and the instructor. Rather than emailing questions to the teaching staff, I encourage you to post your questions on Piazza.

Find our class page at: https://piazza.com/uci/winter2018/compsci167

## Course
Meeting Times

## ·
Lectures: Tuesdays and Thursdays, 11am - 12:20pm, room ICS 180

## Course
Staff

## ·
Instructor: Prof. Stanislaw Jarecki, Donald Bren Hall, room 4026, email: *stasio* (at) *ics*.*uci*.*edu. *

## ·
TA: Jiayu Xu, Donald Bren Hall, room 4039, email: *jiayux *(at) *uci*.*edu.*

## (Please write "CS167" in the subject line when you send us class-related emails.)

## · Stanislaw Jarecki: Monday 2:30 - 4

## · Jiayu Xu: Wednesday 2-3 and Friday 2-3

## Grading:

30% homeworks

30% midterm (originally planned for Thursday, Feb 15), but **postponed by a week to Thursday, Feb 22 !**

40% final

## Textbook:

Note that the *1st edition* of the above textbook can be found. The differences are not very large but still 2nd edition is better and this is the one we will use.

·
You may collaborate on the homeworks, but in groups whose size
does not exceed two students. (If you want to work in a larger group you need an explicit permission of the instructor.)

·
Each student must write down their solution on their own
own. If you collaborated with someone else on the homework, you must list
the name of this person on your homework as your collaborator.

·
Similarly, if you consulted any other source while solving a
homework problem, e.g. a book or on-line lecture notes, you must list this
source clearly on your homework. **It
is a violation of an academic policy to consult any source on your homework
without giving them a proper credit.**

·
Any extra credit question on the homework must be solved
individually.

·
Homework will be due at the time specified on a homework (you get at least a week to do each homework) and they are submitted via a **gradescope** website: you'll get an email showing you the website to upload the homework too. The homework should be uploaded in **pdf** format (please no **jpg**!) and it must be *readable*, so if you can either type it or write it down legibly and then photograph/scan and convert to pdf and test if the result is legible before you upload it to gradescope.

·
**Extensions**: each student can take ***one* 24-hour **extension throughout the quarter. This automatic extension can be taken anytime but only once spent in units of 24 hours
on any of the assignments and projects. Please mark the submission time for any
late assignment. There will be no additional extensions.