E0248: Theoretical Foundations of Cryptography, Fall 2017

Instructor: Dr.Bhavana Kanukurthi

Class timimgs: 9:30 - 11 Monday, Wednesday

Lectures:
  Lecture 1 (07/8/17): Introduction to Cryptography
  Lecture 2 (09/8/17): Limitations of Information-theoretic Cryptography [Section 1.3 of Pass-shelat]
  Lecture 3 (14/8/17): Perfect Secrecy [Contd.], Computational hardness and One-way Functions [Sections 2.1-2.2 of Pass-shelat]
  Lecture 4 (16/8/17): One-way functions (contd.)
  Lecture 5 (21/8/2017) One-way functions continued. [In this lecture and the previous lecture, we proved several lemmas regarding one-way functions. Two of these appear in
          Problem Set 2 [Problems 1 and 2].]

  Lecture 6 (23/8/2017) Hardness Amplification. [We covered Section 2.4.3 of Pass-shelat. Reading the rest of Section 2.4 is recommended.]
  Lecture 7 (28/8/2017) Hardness Amplification contd. Introduced Pseudo-randomness and computational indistinguishability.
  Lecture 8 (30/8/2017) [Covered by OSL Bhavana] Collection of One-way Functions.[Sections 2.5-2.7,2.9 of Pass-shelat]
  Lecture 9 (4/9/2017) [Covered by Sruthi Sekar] Basic probability theory overview.
  Lecture 10 (6/9/2017) Computational Indistinguishability and Pseudo-randomness. [Pointers to lecture notes will be put up after next class.
  Lecture 11 (11/9/2017) Hard-core predicates and Pseudorandomness definitions (next-bit unpredictability and computational indistinguishability) [See Lec 12 handout and reading list]
  Lecture 12 (13/9/2017) Intro to Hybrid arguments via equivalence of PRG definitions. [Slides based on Leo Reyzin's Lecture Notes; Suggested reading: Reyzin's notes for Lec#2 and Lec#3]
  Class cancelled on 18/9/2017
  Lecture 13 (20/9/2017) Recap of Lec 12/PRG with one-bit stretch/Secure Encryption [Pass-shelat Sections 3.3.1-3.3.4, 3.5 - 3.7]
  Lecture 14 (25/9/2017) Expansion of a PRG [Peikert's Lecture notes: Section 1.2 on-wards of Lec#5 and Section 1 of Lec#6]
  Lecture 15 (27/9/2017) PRFs from PRGs [Peikert's Lecture notes: Lec#8] No Class on 2/10/2017
  Lecture 16 (4/10/2017) PRFs from PRGs contd. and Symmetric key encryption [Section 3.9 of Pass-shelat]
  Lecture 18 (9/10/2017) Asymmetric encryption, message authentication codes [Sections 3.10, 5.1 and 5.2 of Pass-shelat]
  Lecture 19 Message Authentication Codes [Pass-shelat, Sections 5.1, 5.2]
  Lecture 20 Authenticated encryption, encrypt-then-MAC-paradigm, relations among notions of encryption [Bellare and Namprempre, Asiacrypt 2000 PDF]
  Lecture 21 Digital Signatures [Reyzin, Chapter 9; We didn't see the details of the CRHF construction but it's a recommended read.]
  Lecture 22 Interactive Proofs [Peikert, Chapter 15, pdf]
Student Presentations
  Lecture 23 (1/11/17) IP=PSPACE [ Arora and Barak , Chapter 8] - Nikhil Gupta
  Lecture 24 (12/11/17) IP=PSPACE [Contd. ] - Nikhil Gupta
  Lecture 25 (13/11/17) Hybrid Encryption, El Gammal Encryption, Zero-knowledge proofs [Jon Katz, Lecture no 4 ,and 5 ; Presented by Akanksha Sisodiya, Saurabh D, Keshav P]
  Lecture 26 (15/11/17) Adaptively secure NIZK and public key encryption scheme secure against CCA1 [Jon Katz, Lecture no 6, pdf ; Presented by Sarah Tilscher and Nishat Koti]
  Lecture 27 (17/11/17) CCA1-secure Naor-Yung encryption scheme and CCA2-secure Dolev-Dwork-Naor encryption scheme [Jon Katz, Lecture no 7, pdf ; Presented by Pooja             Kulkarni, Sanket Purandare]
  Lecture 28 (18/11/17) The Dolev-Dwork-Noar encryption scheme [Jon Katz, Lecture no 8, pdf ; Presented by Abhishek Uppar,Janaky Murthy]
  Lecture 29 (20/11/17) Cramer Shoup Encryption Scheme [Jonathan Katz, Lecture no.9, pdf ; Presented by Dara Singh Vohra , Harsh Kara]
  Lecture 30 (22/11/17) The Cramer-Shoup encryption scheme [Jon Katz, Lecture no 10, pdf ; Presented by Rishabh Deshmukh , Aayush Moroney]
  Lecture 31 (24/11/17) Constructing NIZK Proofs [Jon Katz, Lecture no 11, pdf; Presented by Sarvesh and Vinayak]
  Lecture 32 (27/11/17) Constructing NIZK Proofs [Jon Katz, Lecture no 12, pdf and lecture no 13, pdf ; Presented by Amit, Vysaq P R and Abinash Khare]

Recommended Reading:
  Foundations of Cryptography, Volume I-II , Oded Goldreich
  Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell
Lecture notes by Leonid Reyzin
Lecture notes by Rafail Pass and Abhi Shelat
Draft Lecture notes by Rafail Ostrovsky

Assignments:
Assignment 1   Due on Monday, August 28th, 5:00PM
Assignment 2   Due on Friday, September 15th, 5:00PM
Assignment 3   Due on Tuesday, October 17th, 11:59P.M. via email.

Announcements:
  Assignment 3 is up!!