E0248: Theoretical Foundations of Cryptography, Fall 2017
Instructor: Dr.Bhavana Kanukurthi
9:30 - 11 Monday, Wednesday
Lecture 1 (07/8/17): Introduction to Cryptography
Lecture 2 (09/8/17): Limitations of Information-theoretic Cryptography [Section 1.3 of Pass-shelat]
Lecture 3 (14/8/17): Perfect Secrecy [Contd.], Computational hardness and One-way Functions [Sections 2.1-2.2 of Pass-shelat]
Lecture 4 (16/8/17): One-way functions (contd.)
Lecture 5 (21/8/2017) One-way functions continued. [In this lecture and the previous lecture, we proved several lemmas regarding one-way functions. Two of these appear in Problem Set 2 [Problems 1 and 2].]
Lecture 6 (23/8/2017) Hardness Amplification. [We covered Section 2.4.3 of Pass-shelat. Reading the rest of Section 2.4 is recommended.]
Lecture 7 (28/8/2017) Hardness Amplification contd. Introduced Pseudo-randomness and computational indistinguishability.
Lecture 8 (30/8/2017) [Covered by OSL Bhavana] Collection of One-way Functions.[Sections 2.5-2.7,2.9 of Pass-shelat]
Lecture 9 (4/9/2017) [Covered by Sruthi Sekar] Basic probability theory overview.
Lecture 10 (6/9/2017) Computational Indistinguishability and Pseudo-randomness. [Pointers to lecture notes will be put up after next class.
Lecture 11 (11/9/2017) Hard-core predicates and Pseudorandomness definitions (next-bit unpredictability and computational indistinguishability) [See Lec 12 handout and reading list]
Lecture 12 (13/9/2017) Intro to Hybrid arguments via equivalence of PRG definitions. [Slides based on Leo Reyzin's Lecture Notes; Suggested reading: Reyzin's notes for Lec#2 and Lec#3]
Class cancelled on 18/9/2017
Lecture 13 (20/9/2017) Recap of Lec 12/PRG with one-bit stretch/Secure Encryption [Pass-shelat Sections 3.3.1-3.3.4, 3.5 - 3.7]
Lecture 14 (25/9/2017) Expansion of a PRG [Peikert's Lecture notes: Section 1.2 on-wards of Lec#5
and Section 1 of Lec#6
Lecture 15 (27/9/2017) PRFs from PRGs [Peikert's Lecture notes: Lec#8
No Class on 2/10/2017
Lecture 16 (4/10/2017) PRFs from PRGs contd. and Symmetric key encryption [Section 3.9 of Pass-shelat]
Lecture 18 (9/10/2017) Asymmetric encryption, message authentication codes [Sections 3.10, 5.1 and 5.2 of Pass-shelat]
Lecture 19 Message Authentication Codes [Pass-shelat, Sections 5.1, 5.2]
Lecture 20 Authenticated encryption, encrypt-then-MAC-paradigm, relations among notions of encryption [Bellare and Namprempre, Asiacrypt 2000 PDF
Lecture 21 Digital Signatures [Reyzin, Chapter 9; We didn't see the details of the CRHF construction but it's a recommended read.]
Lecture 22 Interactive Proofs [Peikert, Chapter 15, pdf
Foundations of Cryptography, Volume I-II , Oded Goldreich
Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell
by Leonid Reyzin
by Rafail Pass and Abhi Shelat
Draft Lecture notes
by Rafail Ostrovsky
Due on Monday, August 28th, 5:00PM
Due on Friday, September 15th, 5:00PM
Due on Tuesday, October 17th, 11:59P.M. via email.
Assignment 3 is up!!