DOC PREVIEW
Princeton COS 433 - Course Description

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

COS 433: CryptographyFall 2007Instructor: Boaz Barak ( [email protected] ). Office hours: Thursday after class (3pm)or make an appointment by email.Course times: Tuesday and Thursday, 1:30pm - 2:50pm.AI: Rajsekar Manokaran ( [email protected] )Before Thursday:1. Join the course’s mailing list.2. Think how would you make a precise definition of a secure (private key) encryptionscheme.3. After thinking about this, read the excerpt from the Katz-Lindell book on the prin-ciples of modern cryptography.1 Course DescriptionCryptography or “secret writing” has been around for about 4000 years, but was revolutionizedin the last few decades. The first aspect of this revolution involved placing cryptography on moresolid mathematical grounds, thus transforming it from an art to a science and showing a way tobreak out of the “invent-break-tweak” cycle that characterized crypto throughout history. Thesecond aspect was extending cryptography to applications far beyond simple codes, including someparadoxical impossible-looking creatures such as public key cryptography, zero knowledge proofs,and playing poker over the phone.This course will be an introduction to modern “post-revolutionary” cryptography with an em-phasis on the fundamental ideas (as opposed to an emphasis on practical implementations). Amongthe topics covered will be private key and public key encryption schemes, digital signatures, one-way functions, pseudo-random generators, zero-knowledge proofs, and security against active attacks(e.g., chosen ciphertext security (CCA)). As time permits, we may also cover more advanced topicssuch as the Secure Socket Layer (SSL/TLS) protocol and the attacks on it (Goldberg and Wag-ner, Bleichenbacher), secret sharing, two-party and multi-party secure computation, and quantumcryptography.There are no formal prerequisites for the course, but I will assume that students are able toread and write mathematical proofs. In addition, familiarity with algorithms and basic probabilitytheory will be helpful.Note about schedule: There may be a lecture or two canceled during the term, in which casethere will be make-up lectures during the reading period.2 Course Requirements and Grading.Homework There will be weekly homework assignments, handed each Thursday and due at thebeginning of class the next Tuesday. You can submit the homework to Rajsekar by e-mail(rajsekar@cs), in his mailbox, or by hand in the beginning of the lecture. (The preferredmethod is electronic submission of LATEX-typeset homework.) The homework will count for50% of the course grade (see below).Flexibility in homework: (1) The total points on many assignments will be more than 100.This means that if you obtained say 120 points on the first assignment, and 80 points onthe second assignment you can still get a perfect score on the homework. Sometimes these“bonus” questions (which may be harder or take more time to do) will be explicitly identifiedand sometimes not. (2) You have a total of 4 late days to submit your homework throughoutthe term. Note that part of a day counts as a full day. Beyond that there will be no credit(even not partial) on the homework except in extraordinary circumstances.Important note: There will be no flexibility on the quality of answers. I expect accurate andwell written answers (although not Pulitzer-winning essays...).Final: There will be one take home final in the course, counting for 50% of the grade.Collaboration policy: Collaboration with other students on homework exercises is encouraged.However, each student should write on his/her own the solutions, and should not look atother student’s written solutions. Also, if an idea for a solution came from a different studentor another source, you should give proper credit to the student/source. Using preexistingsolutions from previous years of this course or similar courses of other institutions is strictlyprohibited.Course grade: The course grade will be 50% based on the homework grades and 50% on the


View Full Document

Princeton COS 433 - Course Description

Download Course Description
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Course Description and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Course Description 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?