DOC PREVIEW
Princeton COS 433 - syllabus

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

COS 433: CryptographyFall 2005Instructor: Boaz Barak ( [email protected] ). Office hours: Thursday after class (3-4pm)or make an appointment by email.Times and place: Tuesday and Thursday, 1:30pm - 2:50pm, room 102 in Computer Science bldg.AI: David Xiao ( [email protected] )1 Course DescriptionCryptography or “secret writing” has been around for about 4000 years, but was revolutionizedin the last few decades. The first aspect of this revolution involved placing cryptography on moresolid mathematical grounds, thus transforming it from an art to a science and showing a way tobreak out of the “invent-break-tweak” cycle that characterized crypto throughout history. Thesecond aspe ct was extending cryptography to applications far beyond simple codes, including someparadoxical impossible-looking creatures such as public key cryptography, zero knowledge proofs,and playing poker over the phone.This course will be an introduction to modern “post-revolutionary” cryptography with an em-phasis on the fundamental ideas (as opposed to an emphasis on practical implementations). Amongthe topics covered will be private key and public key encryption schemes, digital signatures, one-way functions, pseudo-ran dom generators, zero-knowledge proofs, and security against active attacks(e.g., chosen ciphertext security (CCA)). As time permits, we m ay also cover more advanced topicssuch as the Secure Socket Layer (SSL/TLS) protocol and the attacks on it (Goldberg and Wag-ner, Bleichenbacher), secret sharing, two-party and multi-party secure computation, and quantumcryptography.There are no formal prerequisites for the course, but I will assume that students are able toread and write mathematical proofs. In addition, familiarity with algorithms and basic probabilitytheory will be helpful. I recommend that CS majors take this c ourse after COS 226 and COS 341.If you’re interested in the course but are not sure you have sufficient background, or you have anyother questions about the course, please contact me at [email protected] about schedule: There may be a lecture or two canceled during the term, in which casethere will be make-up lectures during the reading period.2 Course Requirements and Grading.Homework There will be weekly homework assignments, handed each Tuesday and due at thebeginning of class the next Tuesday. You can submit the homework to Dave by e-mail(dxiao@cs), in his mailbox, or by hand in the beginning of the lecture. (The preferredmethod is electronic submission of LATEX-typeset homework.) The homework will count for50% of the course grade (see below).Flexibility in homework: (1) The total points on many assignments will b e more than 100.This means that if you obtained say 120 points on the first ass ignment, and 80 points onthe second as signment you can still get a perfect score on the homework. Sometimes these“bonus” questions (which may be harder or take more time to do) will be explicitly identifiedand sometimes not. (2) You have a total of 6 late days to submit your homework throughoutthe term. Note that part of a day c ounts as a full day. Beyond that there will be nocredit (even not partial) on the homework except in extraordinary circumstances. (3) In thecalculation of the final grade I will discard the assignment on which you received the lowestgrade.Important note: There will be no flexibility on the quality of answers. I expect accurate andwell written answers (although not Pullitzer-winning essays...).Project: There will be one project in the course, with several phases which will stretch throughoutthe term. More details about the project and the schedule for its different phases will b e pro-vided later. You may work on it in groups of 1–3 students. The project will involve a realisticsecurity application, preferably chosen by you (but with my guidance and advice). It is not aprogramming project and will likely not involve programming (although you may choose toadd a programming component to it). The project counts for 25% of the course grade, but Ireserve the right to raise the final course grade by any amount for truly outstanding projects.Final: There will be one take home final in the course. You may work on it in a 24 hour periodof your choice from the start of the winter recess (December 16th, 2005) to the end of thereading period (January 17th, 2006). The final counts for 25% of the course grade.Collaboration policy: Collaboration with other students on homework exercises is encouraged.However, each student should write on his/her own the solutions, and should not look atother student’s written solutions. Also, if an idea for a solution came from a different studentor another source, you should give proper credit to the student/source. Using preexistingsolutions from previous years of this course or similar courses of other institutions is strictlyprohibited.Collaboration on the project should be only within the group. Work on the final should bedone alone and as directed.Course grade: The course grade will be based on a numeric grade X between 0 and 100 whichis computed as follows: let the homework grade H b e the average of your homework grade,not including the lowest-graded assignment. If H > 100 we let H be 100. Let P be yourproject grade, and F be the final grade (again if F > 100 we let F be 100). We computeX = 0.5H + 0.25P + 0.25F . I will translate X to a letter grade based on a reasonable scaleto be determined later. However, as mentioned above I may raise the final letter grade forstudents that submitted truly outstanding


View Full Document

Princeton COS 433 - syllabus

Download syllabus
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view syllabus and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view syllabus 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?