UCI class CompSci.167: Applied Cryptography, Winter 2018

CompSci.167:  Applied Cryptography

Winter 2018

 

This course explains the inner working of cryptographic tools, the security properties they are designed to achieve, how to reason about their security, and how to properly use them.  We will cover topics such as encryption (secret-key and public-key), message authentication, user authentication, digital signatures, key management, cryptographic hashing, network security protocols (SSL, IPsec), and public-key infrastructure.  Towards the end of the class we will touch on a few advanced topics such as zero-knowledge proofs and secure computation.

Prerequisites:  The course is intended for upper-level undergraduates, and we assume familiarity with algorithms (CS.161) and discrete math (ICS.6B / ICS.6D).  Basic understanding of probability theory and modular arithmetic will be helpful, although we will review relevant concepts as we need them.

 

Course Information

·         CourseSyllabus (and readings)

·         Repository of Lecture Notes

Class Discussions on Piazza

This term we will be using Piazza for class discussion. The system allows for getting you help fast and efficiently from classmates, the TA, and the instructor.  Rather than emailing questions to the teaching staff, I encourage you to post your questions on Piazza.

Find our class page at: https://piazza.com/uci/winter2018/compsci167

Course Meeting Times

·         Lectures:               Tuesdays and Thursdays, 11am - 12:20pm, room ICS 180

Course Staff 

·         Instructor:             Prof. Stanislaw Jarecki, Donald Bren Hall, room 4026, email: stasio (at) ics.uci.edu.  

·         TA:                          Jiayu Xu, Donald Bren Hall, room 4039, email:  jiayux (at) uci.edu.

(Please write "CS167" in the subject line when you send us class-related emails.)

Office Hours

·         Stanislaw Jarecki:  Monday 2:30 - 4

·          Jiayu Xu:  Wednesday 2-3 and Friday 2-3

Grading:

30% homeworks

30% midterm (originally planned for Thursday, Feb 15), but postponed by a week to Thursday, Feb 22 !

40% final

Textbook:

Note that the 1st edition of the above textbook can be found.  The differences are not very large but still 2nd edition is better and this is the one we will use.


Homework Policy

·         You may collaborate on the homeworks, but in groups whose size does not exceed two students.  (If you want to work in a larger group you need an explicit permission of the instructor.)

·         Each student must write down their solution on their own own.  If you collaborated with someone else on the homework, you must list the name of this person on your homework as your collaborator.

·         Similarly, if you consulted any other source while solving a homework problem, e.g. a book or on-line lecture notes, you must list this source clearly on your homework.  It is a violation of an academic policy to consult any source on your homework without giving them a proper credit.

·         Any extra credit question on the homework must be solved individually. 

·         Homework will be due at the time specified on a homework (you get at least a week to do each homework) and they are submitted via a gradescope website:  you'll get an email showing you the website to upload the homework too.  The homework should be uploaded in pdf format (please no jpg!) and it must be readable, so if you can either type it or write it down legibly and then photograph/scan and convert to pdf and test if the result is legible before you upload it to gradescope. 

·         Extensions:  each student can take *one* 24-hour extension throughout the quarter. This automatic extension can be taken anytime but only once spent in units of 24 hours on any of the assignments and projects. Please mark the submission time for any late assignment. There will be no additional extensions.