**Course Description:**

Cryptology is the study of the design and analysis of various encryption schemes, and related topics. The plan is to study the basics of the subject and then touch on several recent developments.

**Grading:** Homework 30%, Two Midterm Tests (30% total), Final: 40%.
Homework should be stapled and submitted on time; late homework will *not*
be accepted. Your lowest homework score will be dropped. Graduate students
will be given additional problems in the homeworks and exams.

**Approximate syllabus**
The following is a *tentative* syllabus.
Chapter numbers refer to the table of contents available here.

- Classical vs. modern cryptography; some historical ciphers; principles of modern cryptography. (Chapter 1.)
- Perfectly-secret encryption. (Chapter 2.)
- Computational security. Symmetric-key encryption. (Chapter 3.)
- Message authentication and hash functions. (Chapter 4.)
- Block ciphers. (Chapter 5.)
- Theoretical constructions. (Sections 6.1, 6.2.)
- Number theory; cryptographic hardness assumptions and their applications. (Chapter 7.)
- The public-key revolution; Diffie-Hellman key exchange. (Chapter 9.)
- Public-key encryption. (Chapter 10.)
- Digital signatures. (Chapter 12.)
- The random oracle model and efficient cryptographic schemes. (Chapter 13.)
- As time permits, we will cover some advanced topics.

Homework 1, due September 16th.

Homework 2, due September 28th.

Homework 3, due October 9th.

Homework 4, due October 23rd. (Problem 4 has now been removed)

Homework 5, due November 4th.

Homework 6, due November 23rd.

Homework 7, due December 9th.

The mid-terms and final exam will be closed-book and closed-notes;
calculators and
other computing equipment will **not** be permitted.

The two mid-terms will be held in class on Oct. 12 and Nov. 9.

The chapters from the textbook for the *first mid-term* are:

- Chapter 1;
- All of Chapter 2 EXCEPT Section 2.4;
- All of Chapter 3 EXCEPT Section 3.2.2; and
- Chapters 4.1 and 4.2.

- Sections 4.3, 4.4, 4.5, and 4.6;
- Construction 4.15 from Sec. 4.7.1 (proof not necessary);
- Chapter 5: pages 159-165;
- Sections 6.1 and 6.2; and
- Section 7.1: up to and including Lemma 7.13.

- Chapter 1;
- All of Chapter 2 except Section 2.4;
- All of Chapter 3 except Section 3.2.2;
- Sections 4.1, 4.2, 4.3, 4.4, 4.5, and 4.6;
- Construction 4.15 from Sec. 4.7.1 (proof not necessary);
- Chapter 5: pages 159-165;
- Sections 6.1 and 6.2;
- Section 7.1 (except for Section 7.1.5);
- Section 7.2 (except for Section 7.2.2);
- Sections 7.3.1 and 7.3.2;
- Chapter 9;
- Sections 10.1, 10.2.1, 10.4.1, and 10.5;
- Sections 12.1, 12.2, 12.3, and 12.4;
- Chapter 13: up to the first 3 lines of page 461 (i.e., we do not cover "Security Proofs in the Random Oracle Model" and beyond); and
- Appendix B.2.3.

To further exhibit your commitment to academic integrity, remember to sign the Honor Pledge on all examinations and assignments: "I pledge on my honor that I have not given or received any unauthorized assistance on this examination (assignment)."