CSE530: Information Security 

Lecture 1 - 21 Jul - Introduction to Information Security - Slides

Lecture 2 - 24 Jul - Introduction (continued)

Lecture 3 - 26 Jul - Probability - Slides Reference (Sections 2,8,9)

Lecture 4 - 28 Jul - Conditional Probability - Slides

Lecture 5 - 31 Jul - Historical Ciphers - Slides (Chapter 1 [KL])

Lecture 6 - 2 Aug - Perfect Secrecy - Slides (Chapter 2 [KL])

Lecture 7 - 4 Aug - Perfectly secure encryption - Slides (Chapter 2 [KL])

Lecture 8 - 7 Aug - Revision & Doubts class

Lecture 9 - 9 Aug - Perfect Secrecy and Drawbacks - Slides (Chapter 2 [KL])

Lecture 10 - 11 Aug - Negligible functions - Slides (Chapter 3.1 [KL])

Lecture 11 - 14 Aug - Computation Security - Slides (Chapter 3.2 [KL])

Lecture 12 - 16 Aug -  Pseudorandom Generators - Slides (3.3 [KL])

Lecture 13 - 18 Aug -  Encryption using PRGs - Slides (3.4 [KL] Do self-reading on encryption for variable length messages)

Lecture 14 - 21 Aug -  CPA security - Slides (3.5 [KL])

Lecture 15 - 23 Aug -  PRFs and CPA secure Encryption from PRFs - Slides (3.6 [KL])

Lecture 16 - 25 Aug -  Modes of Operation - Slides (3.6 [KL])

Lecture 17 - 28 Aug - Message Authentication - Slides (4.3, 4.4 [KL]) 

Lecture 18 - 30 Aug - PRG and PRFs revisted

Lecture 19 - 4 Sep - Message Authentication on Variable-length messages (slides available in lec17 slides) (4.4,4.5 [KL])

Lecture 20 - 6 Sep - Information-theoretic Message Authentication - Slides 

Lecture 21 - 8 Sep - Revision & Assignment Discussion

11-15 Midsem Week 

Lecture 22 - 18 Sep - Replay attacks and CCA security Slides

Lecture 23 - 20 Sep - CCA secure encryption scheme Slides 

Lecture 24 - 22 Sep - Privacy: Secret sharing Scheme (n,n)

Lecture 25 - 25 Sep - Field arithmetic & Secret sharing schemes (2,3) & (3,4)

Lecture 26 - 27 Sep - Replicated Secret Sharing Scheme

Lecture 27 - 29 Sep - Shamir secret Sharing Scheme

Lecture 28 - 7 Oct (FN) - Group arithmetic & Euclid's GCD algorithm (Reference: Upto 7.1.3 in 7.1 of [KL])

Lecture 29 - 7 Oct (FN) - Shamir secret sharing scheme: Reconstruction

Lecture 30&31 - 7 Oct Sat (AN) - Multi-party computation protocol (BGW) - Addition

Lecture 32 - 9 Oct Mon - Multi-party computation protocol (BGW) - Multiplication

Lecture 33 - 11 Oct Wed - Multi-party computation protocol (BGW) - Multiplication (contd.)

Lecture 34 - 16 Oct Mon - Diffie-Hellman Key Exchange (Reference: Up to 7.3.2 in 7.3[KL] & 9.3 [KL])

Lecture 35 - 18 Oct Wed - Factoring and RSA assumptions (Reference: 7.2.3 & 7.2.4 [KL])

Lecture 36 - 29 Oct Thu - Public Key Encryption: Definition and RSA construction (Reference[KL]: 10.2.1, 10.4.1 and (self-read) 10.2.2, 10.4.2 )  

Lecture 37 - 3 Nov Fri - Padded RSA and Elgamal Encryption (Reference [KL]: 10.4.3, 10.5)

Lecture 38 & 39 - 4 Nov Sat - Digital Signatures (Reference [KL]: 12.2, 12.3, 12.4) Slides of lec 37-39 

Quiz and presentations - 4 Nov AN