CSE530: Information Security ODD 25-26
CSE530: Information Security ODD 25-26
Lecture 1 - 22 Jul - Introduction to Information Security - Slides
Lecture 2 - 23 Jul - Probability - Slides Reference (Sections 2,8,9)
Lecture 3 - 29 Jul - Conditional Probability - Slides
Lecture 4 - 30 Jul - Historical Ciphers - Slides (Chapter 1 [KL])
Lecture 5 - 1 Aug - Perfect Secrecy - Slides (Chapter 2 [KL])
Lecture 6 - 5 Aug - Perfectly secure encryption Slides
Lecture 7 - 6 Aug - Security of Vernam Cipher (OTP) &Discussion on perfect secrecy of Shift Cipher
Lecture 8 - 8 Aug - Discussion on perfect secrecy of Substitution and Vigenere Ciphers Slides
Lecture 9 - 12 Aug - Perfect Secrecy and Drawbacks - Slides (Chapter 2 [KL])
Lecture 10 - 13 Aug - Negligible functions - Slides (Chapter 3.1 [KL])
Lecture 11 - 19 Aug - Computation Security - Slides (Chapter 3.2 [KL])
Lecture 12&13 - 20& 22 Aug - Pseudorandom Generators - Slides (3.3 [KL])
Various PRG Candidates were discussed on board
Lecture 14 - 26 Aug - Encryption using PRGs - Slides (3.4 [KL])
Lecture 15&16 - 27 & 29 Aug - CPA security - Slides (3.5 [KL]) PRFs and CPA secure Encryption from PRFs - Slides (3.6 [KL])
Various CPA encryption Candidates were discussed on board
Lecture 17 - 2 Sep - Doubts clarification and revision
Midsem from 3Sep-10Sep
Lecture 18 - 12 Sep - Message Authentication - Slides (4.2)
Lecture 19 - 16 Sep - MAC from PRF (4.3.1[KL])
Lecture 20 -17 Sep - Discussion of Various MAC candidates on board
Lecture 21 - 19 Sep - Domain extension of MAC (slides of lec 18-21 in single pdf) (4.3.2[KL])
Lecture 22 - 20 Sep - Information-theoretic Message Authentication - Slides
Lecture 23,24,25 - 20 Sep - Replay attacks and CCA security Slides (3.7.1, 4.5 [KL])
CCA secure encryption scheme Slides (3.7.1, 4.5 [KL])
Lecture 26 - 23 Sep - Diffie Hellman Key Exchange Slides (Lec26-28) (8.3.2, 10.3 [KL])
Lecture 27 - 24 Sep - Basics of Number Theory (8.1 (upto 8.1.4) , 8.3.1 [KL])
Lecture 28 - 26 Sep - Public-key Encryption, RSA Encryption Slides(Lec 28-32) (11.1 (upto 11.1.1), 8.2.3, 8.2.4, 11.5.1)
Lecture 29 - 14 Oct - Padded RSA Encryption (11.5.2 [KL])
Lecture 30 - 15 Oct - Elgamal Encryption (11.4.1 [KL])
Lecture 31 - 17 Oct - Digital Signatures (12.2, 12.4 [KL])
Lecture 32- 18 Oct - Digital Signatures Contd.
Lecture 33 - 18 Oct - Privacy: Secret sharing Scheme (n,n): Definitions (taught on board!)
Lecture 34 - 18 Oct - Field arithmetic & Secret sharing schemes (2,3) & (3,4) (taught on board!)
Lecture 35 - 21 Oct - Replicated Secret Sharing Scheme (taught on board!)
Lecture 36 - 22 Oct -Shamir secret Sharing Scheme, Lagrange polynomials, (taught on board!)
Lecture 37 - 24 Oct - Privacy preserving multi-party computation (Secure Addition & multiplication protocols(BGW))
Lecture 38 - 28 Oct - Contd
Lecture 39 - 29 Oct - Contd
Reference Text:
Comupter Security by William Stallings
Introduction to modern Cryptography by Jonathan Katz and Yehuda Lindell
Few more references will be updated as and when required.
Teaching Assistants:
Gaje Sathwik: gajesathwik.rs.cse24@itbhu.ac.in
Anuradha Mall: anuradhamall.rs.cse24@itbhu.ac.in