1 
Introduction 

2 
User Authentication Overview, Passwords, Hashing 

3 
Hash Functions 
PS 1 Out 
4 
More Hashing Applications, Unconditional Security 

5 
Unconditional Security 
PS 1 Due
PS 2 Out

6 
Block Ciphers, Modes of Operation 

7 
Intro to NumberTheoretic Crypto 
PS 2 Due
PS 3 Out 
8 
GCD and Modular Inverses, Generators, Discrete Logs, DiffieHellman Key Exchange, El Gamal Encryption and Signatures 

9 
RSA, ChosenCiphertext Attacks, RSAOAEP 
PS 3 Due
PS 4 Out 
10 
CramerShoup, Commitment Schemes 

11 
Quiz 1 

12 
Key Agreement 

13 
SSL, IBS, IBE and Secret Sharing 
PS 4 Due 
14 
Secret Sharing 

15 
ZeroKnowledge 
Project Proposal Due
Midterm Out 
16 
Watermarking and Fingerprinting (Guest Lecture) 

17 
Tamper Resistance and Disk Forensics 
Midterm Due
PS 5 Out 
18 
Physical Security: Physical Uncloneable Functions, TEMPEST 

19 
SelfReferential Programs, Viruses, Buffer Overflow Attacks 
PS 5 Due
PS 6 Out 
20 
More on Viruses 
PS 6 Due 
21 
Trusted Computing (NGSCB aka Palladium; TCPA) 

22 
Trusted Computing, Java Security, Biometrics 

23 
Quiz 2, Concluding Remarks 

24 
Talks 

25 
Talks 

26 
Talks 
Written Term Projects Due
Last Day of Classes 