Announcements

10/2: We'll have Quiz 2 on Thursday 10/10. There will be two questions: (1) a PRF attack, and (2) a question about Feistel network.

Hw1 is up. Here's the support file. Deadline is Tuesday 10/1.

Course information

- Lectures to date - grow with each class.
- Course information sheet. Please read it - you are responsible for everything on it.
- Instructor: Viet Tung Hoang (Tung). Email: tvhoang@cs.fsu.edu. Office hours: Monday and Friday, 2:30 pm - 3:30 pm, virtual. See Canvas for Zoom link.
- Grader:
TBA.

- Homework solution must be typed via LaTeX. LaTeX is the standard for typesetting scientific papers, and will likely come in handy outside CIS 5371.

- Homework template: Here's a Latex template (sample.tex, you need to right click the link and choose "Save link as") for typesetting homework and the pdf file (sample.pdf) that it produces. The file needs an image file ecb.pdf. The template also contains common notation we'll see in class.

- Guides to using LaTeX: An introduction to LaTeX can be found here. Another guide can be found at Wikibooks.

- Online Environments: If you don't want to install LaTeX, ShareLaTeX and Overleaf are online environments which compile previews of your LaTeX documents as you type.

- LaTeX Editors: There are many LaTeX editors which allow you to use GUI to edit your LaTeX. LyX is a free one.

- Finding symbols: Detexify lets you draw the symbol that you are looking for and get LaTeX code. A static guide is here.

Online Crypto Resources

- Introduction to Modern Cryptography, accessible graduate lecture notes by Mihir Bellare and Phillip Rogaway.
- The Joy of Cryptography, undergraduate textbook by Mike Rosulek.

Slides and scribes

- Logistics
- Lecture 0: Some odd problems in crypto.
- Scribe 1: Probabilistic Analysis
- Lecture 1: Introduction
- Lecture 2: Blockcipher
- Lecture 3: Pseudorandom Function (PRF)
- Lecture 4: Symmetric Encryption
- Lecture 5: Message Authentication Code (MAC)
- Lecture 6: Authenticated Encryption (AE).
- Scribe 2: Real attacks on AE schemes.
- Lecture 7: Hash Functions
- Scribe 3: Rho attack
- Lecture 8: Asymmetric Crypto.
- Lecture 9: Public-Key Encryption
- Lecture 10: Digital Signature.
- Lecture 11: Public-key Infrastructure.

Last updated: 10/2/2024