- CTF problems related to these notes
- Feb 11th-13th: Our first brute-force attack (Using Python, Cloud9, CodePen, SHA512. Reversing a hash function. Basic cost of attacks.)
- Feb 13th-18th: Proper Password Storage
- Feb 22nd-27th: Vigeniere, Frequency Analysis, Attack Models, XOR, One-Time Pad
- Feb 27th: Some Historical Ciphers
- Mar 4th - Mar 8th: Modular Arithmetic and Group Theory
- Mar 11th - 13th: Pseduo-Randomness
- Mar 13th and TBA: Cracking LCG and LFSR with Linear Algebra
- Mar 15th - 18th: In a Stream Cipher Mood
- Mar 18th: Stream Cipher Challenge
- Mar 20th: Block Cipher Intro
- Mar 25th: ECB vs CBC Mode, Python Image Library, and Chained CBC weaknesses
- Mar 27th: Block Ciphers as Stream Ciphers: OFB and CTR
- Mar 29th: Project 2, Block Cipher CTF challenge
- Apr 8-10th: Message Authentication Codes (MACs) and Hash Extension
- Apr 12: Secure Channel Design
- Apr 15-17: The Public Key Revolution Diffie-Hellman and Pohlig-Hellman
- Apr 19: El Gamal Encryption
- Apr 22-24: RSA Day!
- SPECIAL Math notes for Pohlig-Hellman and RSA
- Apr 24-26: RSA Vulnerabilities and RSA signatures
- Emergency Back-up Notes
- Apr 29: Lattice Reduction
- May 1: Coppersmith!
- RSA CTF Problem Set
- May 3: Intro to Elliptic Curves
- May 6: Guest Lecture Notes on Quantum Key Distribution (Swati Singh)
- May 8: ECDHE
- LARGE VM for Homomorphic Exercises for May 10th
- May 13: Digital Signature Algorithm
- May 15: Elliptic Curve Digital Signature Algorithm (ECDSA)
- May 17: Meet the DTI and talk cyber at the State level
- May 20: Last-Class Thoughts and Threshold Crypto (Shamir's Secret Sharing) (Also Post-quantum LWE encryption example)