CSE530: Information Security
Lecture 1 - 21 Jul - Introduction to Information Security - Slides
Lecture 2 - 24 Jul - Introduction (continued)
Lecture 3 - 26 Jul - Probability - Slides Reference (Sections 2,8,9)
Lecture 4 - 28 Jul - Conditional Probability - Slides
Lecture 5 - 31 Jul - Historical Ciphers - Slides (Chapter 1 [KL])
Lecture 6 - 2 Aug - Perfect Secrecy - Slides (Chapter 2 [KL])
Lecture 7 - 4 Aug - Perfectly secure encryption - Slides (Chapter 2 [KL])
Lecture 8 - 7 Aug - Revision & Doubts class
Lecture 9 - 9 Aug - Perfect Secrecy and Drawbacks - Slides (Chapter 2 [KL])
Lecture 10 - 11 Aug - Negligible functions - Slides (Chapter 3.1 [KL])
Lecture 11 - 14 Aug - Computation Security - Slides (Chapter 3.2 [KL])
Lecture 12 - 16 Aug - Pseudorandom Generators - Slides (3.3 [KL])
Lecture 13 - 18 Aug - Encryption using PRGs - Slides (3.4 [KL] Do self-reading on encryption for variable length messages)
Lecture 14 - 21 Aug - CPA security - Slides (3.5 [KL])
Lecture 15 - 23 Aug - PRFs and CPA secure Encryption from PRFs - Slides (3.6 [KL])
Lecture 16 - 25 Aug - Modes of Operation - Slides (3.6 [KL])
Lecture 17 - 28 Aug - Message Authentication - Slides (4.3, 4.4 [KL])
Lecture 18 - 30 Aug - PRG and PRFs revisted
Lecture 19 - 4 Sep - Message Authentication on Variable-length messages (slides available in lec17 slides) (4.4,4.5 [KL])
Lecture 20 - 6 Sep - Information-theoretic Message Authentication - Slides
Lecture 21 - 8 Sep - Revision & Assignment Discussion
11-15 Midsem Week
Lecture 22 - 18 Sep - Replay attacks and CCA security Slides
Lecture 23 - 20 Sep - CCA secure encryption scheme Slides
Lecture 24 - 22 Sep - Privacy: Secret sharing Scheme (n,n)
Lecture 25 - 25 Sep - Field arithmetic & Secret sharing schemes (2,3) & (3,4)
Lecture 26 - 27 Sep - Replicated Secret Sharing Scheme
Lecture 27 - 29 Sep - Shamir secret Sharing Scheme
Lecture 28 - 7 Oct (FN) - Group arithmetic & Euclid's GCD algorithm (Reference: Upto 7.1.3 in 7.1 of [KL])
Lecture 29 - 7 Oct (FN) - Shamir secret sharing scheme: Reconstruction
Lecture 30&31 - 7 Oct Sat (AN) - Multi-party computation protocol (BGW) - Addition
Lecture 32 - 9 Oct Mon - Multi-party computation protocol (BGW) - Multiplication
Lecture 33 - 11 Oct Wed - Multi-party computation protocol (BGW) - Multiplication (contd.)
Lecture 34 - 16 Oct Mon - Diffie-Hellman Key Exchange (Reference: Up to 7.3.2 in 7.3[KL] & 9.3 [KL])
Lecture 35 - 18 Oct Wed - Factoring and RSA assumptions (Reference: 7.2.3 & 7.2.4 [KL])
Lecture 36 - 29 Oct Thu - Public Key Encryption: Definition and RSA construction (Reference[KL]: 10.2.1, 10.4.1 and (self-read) 10.2.2, 10.4.2 )
Lecture 37 - 3 Nov Fri - Padded RSA and Elgamal Encryption (Reference [KL]: 10.4.3, 10.5)
Lecture 38 & 39 - 4 Nov Sat - Digital Signatures (Reference [KL]: 12.2, 12.3, 12.4) Slides of lec 37-39
Quiz and presentations - 4 Nov AN
Assignment 1: To be submitted by Aug 10 hand-written.
TAs: Arpit (arpitsanghai.cse22@itbhu.ac.in), Chetas (chetasnshinde.cse22@itbhu.ac.in) and Akhil (akhilrao.cse22@itbhu.ac.in)
Reference Books:
[KL] Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell
Computer Security by William Stallings