B504/I538: Introduction to Cryptography

Slides:



Advertisements
Similar presentations
Welcome to the seminar course
Advertisements

COMP171 Data Structures and Algorithms Spring 2009.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
Computer Science 102 Data Structures and Algorithms V Fall 2009 Lecture 1: administrative details Professor: Evan Korth New York University 1.
CHEMISTRY 10123/10125 Spring 2007 Instructor: Professor Tracy Hanna Phone: Office: SWR 418
CIS 5371 Cryptography Introduction.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Topic 22: Digital Schemes (2)
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Lecture Section 001 Spring 2008 Mike O’Dell CSE 1301 Computer Literacy.
Lectures so far: Today’s lecture: Discrete probability Proving things
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
James Tam Introduction To CPSC 233 James Tam Java Object-Orientation Event driven software.
James Tam Introduction To CPSC 233 James Tam Java Object-Orientation Graphical-user interfaces.
Computer Networks CNT5106C
1 CSE Cryptography and Security Ten H. Lai Autumn 2009.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Astronomy 20 – The Solar System AND Astronomy 25 – Stars and Galaxies
All important information will be posted on Blackboard
Computer Network Fundamentals CNT4007C
ENCM 369 Computer Organization
Networking CS 3470, Section 1 Sarah Diesburg
MATH/COMP 340: Numerical Analysis I
1 MATH 112 (Thursday) Fall 2014 Instructor:.
COMP 283 Discrete Structures
Chuck Frank Northern Kentucky University
Computer Networks CNT5106C
NWEN 243 Network Applications
Computer Science 102 Data Structures CSCI-UA
Autonomous Cyber-Physical Systems: Course Introduction
FALL 2017 Dr. Senanu Spring-Pearson
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
B504/I538: Introduction to Cryptography
Computer Networks CNT5106C
Lecture 0 Course Information
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Mrs. Atkinson 6th grade Math and Science
CSCD 330 Network Programming Spring
CRYPTOGRAPHY קריפטוגרפיה Thu 15:45-18:15.
Chuck Frank Northern Kentucky University
Welcome to CS220/MATH 320 – Applied Discrete Mathematics Fall 2018
Welcome to the First-Year Experience!
Tonga Institute of Higher Education IT 141: Information Systems
Sun Mon Tue Wed Thu Fri Sat
CSCD 330 Network Programming Spring
CIS5930: Advanced Topics in Parallel and Distributed Systems
Introduction to Cryptography
Welcome to CS 410 – Introduction to Software Engineering Spring 2019
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
CS 3950 Introduction to Computer Science Research
Sun Mon Tue Wed Thu Fri Sat
Computer Networks CNT5106C
Introduction To CPSC 233 James Tam Event driven software
Syllabus and Class Policies
Fall 2018 Syllabus & Class Policies
CSCI284 Spring 2004 GWU Introduction CSCI284 Spring 2004 GWU
Sun Mon Tue Wed Thu Fri Sat
Honors Analysis COURSE DESCRIPTION
MATH 331: Partial Differential Equations
Tonga Institute of Higher Education IT 141: Information Systems
CS Problem Solving and Object Oriented Programming Spring 2019
Introduction To CPSC 233 James Tam Event driven software
Term Dr Abdelhafid Bouhraoua
MA Fall Instructor: Tim Rolling -Office: MATH 719 -
CMPT 238 Data Structures Instructor: Tina Tian.
Financial Mathematics
MA Fall 2018 Instructor: Hunter Simper Office: Math 607
Presentation transcript:

B504/I538: Introduction to Cryptography Spring 2017 • Lecture 1 (2017—01—10)

Administrivia

Instructor: Ryan Henry Office hours: Fridays @ 10:30 — 11:30 (or by appointment)  http://homes.soic.indiana.edu/henry   henry@indiana.edu  LH 330e - Alas, Ryan is stuck in Washington DC today ; - (

Associate Instructor (AI) Instructor: Swami Ramesh Office hours: Fridays @ 13:30 — 14:30 (or by appointment)  swamivr@indiana.edu  LH 330a

Required textbook Introduction to Modern Cryptography (2nd edition) Jonathan Katz and Yehuda Lindell Chapman & Hall/CRC Cryptography and Network Security Series November 2014 Katz’ website  IU Bookstore  * * CRC Press  * Amazon 

 http://homes.soic.indiana.edu/henry/courses/b609/s17 Course website  http://homes.soic.indiana.edu/henry/courses/b609/s17 The course website is the official source for: assignments, lecture slides, important announcements, supplemental material, etc. Please check the course website frequently! Also, Canvas: https://iu.instructure.com/courses/1600125 

Tuesdays and Thursdays Lectures (presumably you’ve already figured this out) Tuesdays and Thursdays @ 13:00—14:15 in Ballantine Hall (BH) 322

A: Only if you want answers (in other words: YES, PLEASE DO!) Should I interrupt with questions during lectures? Only if you want answers (in other words: YES, PLEASE DO!) A:

Grading and assessment 80% 20% 10% written assignments in-class quizzes participation 8 assignments at 10% each 4 quizzes at 5% each 110% total (Lowest assignments automatically be dropped)

Grading and assessment A+ 97% B+ 87% C+ 77% D+ 67% A 93% B 83% C 73% D 63% A- 90% B- 80% C- 70% D- 60%

Homework ASK FOR HELP EARLY! One assignment assigned every second Tuesday* Due before Tuesday lecture two weeks later Mostly written with some coding problems ASK FOR HELP EARLY! We will stop providing help starting 10 days after assignment is distributed! * with a few exceptions ― see the calendar

Homework (sample timeline) office hours assignment distributed Sun Mon Tue Wed Thu Fri Sat week N: office hours Sun Mon Tue Wed Thu Fri Sat week N+1: last day for help!! Sun Mon Tue Wed Thu Fri Sat week N+2: assignment due (next assignment distributed)

Typesetting with ￯ Q: By a show of hands, who here knows ￯? - If your hand is not up, good news: you get to learn ￯!! Written portion of assignments must be typeset using ￯ We will give you the ￯ source for every assignment SoIC has a site license for ShareLaTeX 

Umm … Never! A: When do we start talking about cartography? (this class is about cryptography!) A:

Well what in the @#%★‽! is Huh!? No maps?? Well what in the @#%★‽! is “cryptography”?

What in the @#%★‽! is Cryptography ? And, more generally, what is this course all about?

What is this class all about? Short answer: The theoretical foundations of modern cryptography Cryptography ⊆ mathematics No specific background is assumed, but “mathematical maturity” will help We will cover the necessary math as we go!

What is this class all about? On the other hand, physicists like to say that physics is to math as sex is to masturbation https://xkcd.com/435/

What is this class all about? NOT What is this class all about? Cartography, for starters But also: particulars of deployed encryption schemes specific “hard” problems how to implement, use, or break specific cryptographic software ADVICE: Don’t try to implement crypto yourself!

I will make you write lots of proofs *gasp!* I will make you write lots of proofs statement 1 statement 2 statement 3 ⋮ statement n I don’t see why statement 2 follows from statement 1 NO MARKS FOR YOU! Victor (the verifier) Peggy (the prover)

I will make you write lots of proofs I231: Introduction to the Mathematics of Cybersecurity *gasp!* I will make you write lots of proofs Victor is very thorough yet very lazy - will catch every mistake you make…but - cannot be bothered to supply missing details A perfectly valid complaint for Victor: “I don’t understand!” (or even, “This is poorly written”) Victor (the verifier)

NO!! WAIT! So it’s all math and proofs? It’s not just any math and (See ya—I’m dropping!) NO!! WAIT! It’s not just any math and proofs…it’s super important, super cool math and proofs!

“Core” crypto Key establishment Secure communication   m1 m2 confidentiality/integrity

More advanced crypto Digital signatures Bob signed this message

More advanced crypto Who am I talking to??? Digital signatures Anonymous communications Who am I talking to???

More advanced crypto What am I computing for Bob?? Digital signatures Anonymous communications Oblivious computation What am I computing for Bob??

Who just paid for that widget? More advanced crypto Digital signatures Anonymous communications Oblivious computation Anonymous digital currencies Who just paid for that widget? Ƀ

Cryptographic protocols End-to-end verifiable elections (as if anybody ever suspected an election was rigged!) Election authority and the winner is…

Cryptographic protocols End-to-end verifiable elections (as if anybody ever suspected an election was rigged!) Secure multiparty computation x2 x4 f(x1,x2,x3,x4,x5) x1 x5 x3

Crypto magic And a whole lot more… Proofs of Group signatures data possession Group signatures Multiparty computation Commitment schemes Homomorphic encryption Zero-knowledge proofs Secret sharing Oblivious transfer Private information retrieval Deniable messaging Differential privacy Verifiable outsourced computation And a whole lot more…

Modern cryptograpy == Science Three steps in modern crypto propose a precise threat model propose a construction prove that breaking construction is “equivalent” to solving an intractable problem (or impossible)

That’s all for today, folks! Thursday’s lecture: Discrete probability 101