CSE530: Information Security ODD 25-26
CSE530: Information Security ODD 25-26
Lecture 1 - 22 Jul - Introduction to Information Security - Slides
Lecture 2 - 23 Jul - Probability - Slides Reference (Sections 2,8,9)
Lecture 3 - 29 Jul - Conditional Probability - Slides
Lecture 4 - 30 Jul - Historical Ciphers - Slides (Chapter 1 [KL])
Lecture 5 - 1 Aug - Perfect Secrecy - Slides (Chapter 2 [KL])
Lecture 6 - 5 Aug - Perfectly secure encryption Slides
Lecture 7 - 6 Aug - Security of Vernam Cipher (OTP) &Discussion on perfect secrecy of Shift Cipher
Lecture 8 - 8 Aug - Discussion on perfect secrecy of Substitution and Vigenere Ciphers Slides
Lecture 9 - 12 Aug - Perfect Secrecy and Drawbacks - Slides (Chapter 2 [KL])
Lecture 10 - 13 Aug - Negligible functions - Slides (Chapter 3.1 [KL])
Lecture 11 - 19 Aug - Computation Security - Slides (Chapter 3.2 [KL])
Lecture 12&13 - 20& 22 Aug - Pseudorandom Generators - Slides (3.3 [KL])
Various PRG Candidates were discussed on board
Lecture 14 - 26 Aug - Encryption using PRGs - Slides (3.4 [KL])
Lecture 15&16 - 27 & 29 Aug - CPA security - Slides (3.5 [KL]) PRFs and CPA secure Encryption from PRFs - Slides (3.6 [KL])
Various CPA encryption Candidates were discussed on board
Lecture 17 - 2 Sep - Doubts clarification and revision
Midsem from 3Sep-10Sep
Lecture 18 - 12 Sep - Message Authentication - Slides (4.3, 4.4 [KL])
Lecture 19 - 16 Sep - MAC from PRF
Lecture 20 -17 Sep - Discussion of Various MAC candidates on board
Lecture 21 - 19 Sep - Domain extension of MAC (slides of lec 18-21 in single pdf)
Tentative Lecture Plan
Lecture 22 - 23 Sep - Information-theoretic Message Authentication - Slides
Lecture 23&24 - 24 & 26 Sep - Replay attacks and CCA security Slides CCA secure encryption scheme Slides
Lecture 25 - 7 Oct - CCA secure Encryption
Lecture 26&27 - 8 Oct & 14 Oct - Privacy: Secret sharing Scheme (n,n), Replicated Secret Sharing Scheme
Lecture 28 - 15 Oct - Field arithmetic & Secret sharing schemes (2,3) & (3,4)
Lecture 29,30,31 - 17,21,22 Oct - Shamir secret Sharing Scheme, Lagrange polynomials,
Lecture 32,33,34 - 24&28&29 Oct - Privacy preserving multi-party computation (Secure Addition & multiplication protocols(BGW))
Lecture 35 - 31 Oct
Lecture 36 - 4 Nov
Lecture 37 -
Lecture 38 -
Lecture 39 -
Reference Text:
Comupter Security by William Stallings
Introduction to modern Cryptography by Jonathan Katz and Yehuda Lindell
Few more references will be updated as and when required.
Teaching Assistants:
Gaje Sathwik: gajesathwik.rs.cse24@itbhu.ac.in
Anuradha Mall: anuradhamall.rs.cse24@itbhu.ac.in