| Date | Topic | Readings | Due |
| Monday, August 23 |
Introduction: What is a cryptosystem? Cryptosurvivor |
|
|
| Wednesday, August 25 |
Caesar cipher, frequency analysis; introduction to modular arithmetic and affine ciphers |
Beutelspacher, pages 1-12 |
Cryptosurvivor decryption |
| Friday, August 27 |
Modular arithmetic: addition, subtraction, multiplication; affine ciphers |
Beutelspacher, pages 12-18 |
Install MAPLE; Chapter 1 of Singh (J) |
| Monday, August 30 |
Modular arithmetic (cont.); affine ciphers |
Silverman, pp. 27-31, 34-41 |
Assignment 1 |
| Wednesday, September 1 |
Euclidean algorithm; linear equations and affine ciphers |
Beutelspacher, pages 108-112; Silverman, pp. 25-35, 47-49 |
|
| Friday, September 3 |
Euclidean algorithm (cont.); complexity and feasible algorithms; |
Beutelspacher, 25-41, 52-55 |
|
| Monday, September 6 |
Extended Euclidean algorithm (cont.) |
|
Assignment 2 |
| Wednesday, September 8 |
Extended Euclidean algorithm (cont.) |
|
|
| Friday, September 10 |
Complexity and feasible algorithms, especially EA |
Silverman, Chap.16 |
|
| Monday, September 13 |
Binary number system; successive squaring |
|
|
| Wednesday, September 15 |
Fermat's Little Theorem |
|
Assignment 3 |
| Friday, September 17 |
Vigenere cipher and the Kasiski test; Maple demo |
Maple worksheet 1 |
|
| Wednesday, September 22 |
Vigenere cipher and the Kasiski test; Maple demo |
Chapter 3, Singh |
|
| Friday, September 24 |
The Enigma machine |
Enigma |
|
| Monday, September 27 |
The Enigma machine (cont.) |
|
Term paper proposal |
| Wednesday, September 29 |
The Enigma machine (cont.) |
|
Assignment 4 |
| Friday, October 1 |
The Enigma machine (cont.) |
|
|
| Monday, October 4 |
The Enigma machine (cont.) |
Chapter 4, Singh |
|
| Wednesday, October 6 |
The Enigma machine (cont.) |
|
|
| Friday, October 8 |
Linear Feedback Shift Registers |
|
Assignment 5 |
| Wednesday, October 13 |
Linear Feedback Shift Registers (cont.) |
Beutelspacher, pages 52-63 |
|
| Friday, October 15 |
Class discussion: What is, has been and should be the role of government in cryptography policy? |
pp. 1-76 of Diffie-Landau |
|
| Monday, October 18 |
|
|
Term paper outline |
| Wednesday, October 20 |
Midterm Exam |
|
|
| Friday, October 22 |
Merkle's puzzles; Les puissances myst?rieuses |
|
|
| Monday, October 25 |
Diffie-Hellman key exchange protocol |
Beutelspacher, pp. 120-124 |
Maple worksheet |
| Wednesday, October 27 |
RSA |
Beutelspacher, pp. 97-120 |
Team key exchanges, part one |
| Friday, October 29 |
RSA (cont.) |
|
Team key exchanges, part two |
| Monday, November 1 |
RSA and SSL
|
Bob and Alice secure your personal information
|
RSA encryptions |
| Wednesday, November 3 |
DMCA, copyright and file-sharing: true confessions |
|
|
| Friday, November 5 |
DMCA |
|
Assignment 6 |
| Monday, November 8 |
DMCA and free speech |
|
|
| Wednesday, November 10 |
DMCA on the march |
|
|
| Friday, November 12 |
DMCA:what to do? |
|
|
| Monday, November 15 |
DMCA:what to do? (cont.) |
|
|
| Wednesday, November 17 |
DMCA:what the experts think |
|
|
| Friday, November 19 |
Remote coin-flipping |
|
Term paper rough draft |
| Monday, November 22 |
Remote coin-flipping (cont.) |
|
|
| Monday, November 29 |
Remote coin-flipping: how to lose |
|
Jack/Jill winners report |
| Wednesday, December 1 |
Course review |
|
Term paper |