You can download the lectures here. We will try to upload lectures prior to their corresponding classes.

  • Basic Understanding of Cryptography
    tl;dr: This is our very first class. We will discuss the term "cryptography" and its usefulness in simple terms, highlighting its importance in our daily lives.
    [slide]
  • Private key encyption scheme - basic setup (i)
    tl;dr: Private key encryption scheme, mathematical setup. Algirithms with coin tossing capability i.e., probabilistic algorithm. Kerckhoffs' Principle and its importance.
    [slides]
  • Private key encyption scheme - basic setup (ii)
    tl;dr: "Private key encryption scheme, mathematical setup. Simulation of discrete distributions using coin tosses. Kerckhoffs' Principle and its importance"-- continued.
    [slides]
  • Historical Ciphers
    tl;dr: Historical Ciphers: Shift Ciphers, Substitution Cipher, Permutation Cipher, Vigenère Cipher, Stream Ciphers and their analysis.
    [slides]

    Suggested Readings:

    • Chapter 2 of "Cryptography: Theory and Practice" by Douglas R. Stinson.
  • Cryptanalysis of Historical Ciphers
    tl;dr: Cryptanalysis of Shift Ciphers and Vigenère Cipher, Concept of Index of Coincidence.
    [slides]

    Suggested Readings:

    • Chapter 2 of "Cryptography: Theory and Practice" by Douglas R. Stinson.
  • Mathematical Prerequisites
    tl;dr: Modular arithmetic, groups, cyclic groups, discrete loagarithms, finite ring and fields.
    [slides]

    Suggested Readings:

    • Any Algebra book recommended for the undergraduate level.
  • Mathematical Prerequisites Continued.
    tl;dr: Modular arithmetic, groups, cyclic groups, discrete loagarithms, finite ring and fields.
    [slides(same as prev. lec.)]

    Suggested Readings:

    • Any Algebra book recommended for the undergraduate level.
  • Private Key Encryption Schemes & Perfect Secracy
    tl;dr: Definition of perfect Secrecy, perfect indistinguishability, One Time Pad (OTP)
    [slides]

    Suggested Readings:

    • Jonathan Katz and Yehuda Lindell: Introduction to Modern Cryptography (textbook)
  • Private Key Encryption Schemes & Perfect Secracy contunued..
    tl;dr: Definition of perfect Secrecy, perfect indistinguishability, One Time Pad (OTP)
    [slides(same as prev. lec.)]

    Suggested Readings:

    • Jonathan Katz and Yehuda Lindell: Introduction to Modern Cryptography (textbook)
  • Computational Indistinguishability in the preseance of eavesdropper
    tl;dr: Computational indistinguishability, a PPT Adversary
    [slides]

    Suggested Readings:

    • Jonathan Katz and Yehuda Lindell: Introduction to Modern Cryptography (textbook)
  • Pseudorandomness and Pseudorandom Generator
    tl;dr: Computational indistinguishability, a PPT Adversary
    [slides]

    Suggested Readings:

    • Jonathan Katz and Yehuda Lindell: Introduction to Modern Cryptography (textbook)
  • Stonger Security Notions and PRF
    tl;dr: EAV-securty for multiple encryption, CPA Securty, Pseudorandom Function
    [slides]

    Suggested Readings:

    • Jonathan Katz and Yehuda Lindell: Introduction to Modern Cryptography (textbook)
  • Construction of CPA-secure encryption schemes
    tl;dr: PRF, PRF, Block Ciphers, Modes of Operations, CBC MOP
    [slides]

    Suggested Readings:

    • Jonathan Katz and Yehuda Lindell: Introduction to Modern Cryptography (textbook)
  • Modes of Operations of Block Cipher
    tl;dr: CBC, Statefull CBC, OFB, CTR
    [slides]

    Suggested Readings:

    • Jonathan Katz and Yehuda Lindell: Introduction to Modern Cryptography (textbook)
  • CCA Security
    tl;dr: IND-CCA, CCA Security, PKCS #5 padding
    [slides]

    Suggested Readings:

    • Jonathan Katz and Yehuda Lindell: Introduction to Modern Cryptography (textbook)
  • Padding Oracle Attack
    tl;dr: Partial Decryption Oracle, PKCS #5 padding, Padding Oracle Attack
    [slides]

    Suggested Readings:

    • Jonathan Katz and Yehuda Lindell: Introduction to Modern Cryptography (textbook)
  • Design Principles of Block Ciphers (AES)
    tl;dr: Design Principles of Block Ciphers/Pseudorandom Permutations (AES)
    [slides] [Alfred's slides] [FIPS 197]

    Suggested Readings:

    • FIPS 197 Advanced Encryption Standard (AES)
  • Design Principles of Block Ciphers (AES)- Recap
    tl;dr: Design Principles of Block Ciphers/Pseudorandom Permutations (AES)
    [same as prev. slides] [Alfred's slides] [FIPS 197]

    Suggested Readings:

    • FIPS 197 Advanced Encryption Standard (AES)
  • Design Principles of Block Ciphers (AES)..
    tl;dr: Design Principles of Block Ciphers/Pseudorandom Permutations (AES)
    [same as prev. slides] [Alfred's slides] [FIPS 197]

    Suggested Readings:

    • FIPS 197 Advanced Encryption Standard (AES)
  • Hash Functions
    tl;dr: Hash Function and its properties. (Pre-image Resistant, second Pre-image resistant, Collision Resistant)
    [slides (thanks Alfred)]

    Suggested Readings:

    • Hash Functions: https://cryptography101.ca/crypto101-building-blocks/
  • Generic Attacks on Hash Functions
    tl;dr: Generic attacks, Birthday Paradox, VW distinguished point collision detection
    [slides]

    Suggested Readings:

    • Hash Functions: https://cryptography101.ca/crypto101-building-blocks/
  • Concrete Construction of Hash Functions
    tl;dr: MDx construction, SHA1, SHA2, SHA3
    [slides]

    Suggested Readings:

    • Hash Functions: https://cryptography101.ca/crypto101-building-blocks/
  • Message Integrity and Authenticated Encryption
    tl;dr: MAC, AE, message integrity and authentication
    [slides]

    Suggested Readings:

    • Message authentication codes: https://cryptography101.ca/crypto101-building-blocks/
  • Message Integrity and GSM Security
    tl;dr: MAC, GSM, Security of GSM
    [slides] [prev slides]

    Suggested Readings:

    • Message authentication codes: https://cryptography101.ca/crypto101-building-blocks/
  • Galois Counter Mode
    tl;dr: AES-GCM, AE
    [slides]

    Suggested Readings:

    • Message authentication codes: https://cryptography101.ca/crypto101-building-blocks/
  • Issue of key management and exchange in Secret key cryptography
    tl;dr: Key managament in SKE, DLP, Factorisation and RSA Problem
    [slides]

    Suggested Readings:

    • Public-key cryptography: https://cryptography101.ca/crypto101-building-blocks/
  • Diffie-Hellman Key Exchange Protocol in PKC
    tl;dr: Diffie-Hellman Key Exchange Protocol, DLP
    [slides]

    Suggested Readings:

    • Public-key cryptography: https://cryptography101.ca/crypto101-building-blocks/
  • Public Key Encryption Schemes
    tl;dr: Diffie-Hellman Key Exchange Protocol, ElGamal, KEM, DEM
    [slides]

    Suggested Readings:

    • Public-key cryptography: https://cryptography101.ca/crypto101-building-blocks/
  • Public Key Encryption Schemes- RSA
    tl;dr: RSA problem, Plain RSA Enc, RSA-OAEP, RSA-KEM
    [slides]

    Suggested Readings:

    • Public-key cryptography: https://cryptography101.ca/crypto101-building-blocks/
  • Digital Signature Schemes
    tl;dr: Digital Signatures, RSA-FDH, ID Protocol
    [slides]

    Suggested Readings:

    • Public-key cryptography: https://cryptography101.ca/crypto101-building-blocks/
  • Digital Certificates
    tl;dr: Digital Certificate, CA, PKI, Web of Trust, TLS, Handshake Protocol
    [slides] [Alfred's Lecture on PKI] [Alfred's Lecture on TLS]

    Suggested Readings:

    • Real-World Deployments: https://cryptography101.ca/crypto101-deployments/