**Course Description:**

Cryptology is the study of the design and analysis of various encryption schemes, and related topics. The plan is to study the basics of the subject and then touch on several recent developments.

**Grading:** Homework 30%, Two Midterm Tests (30% total), Final: 40%.
Homework should be stapled and submitted on time; late homework will *not*
be accepted. Your lowest homework score will be dropped.

**General Info:**

- The first mid-term will be held in class on October 13th; the second mid-term will be held in class on November 17th.
- Class participation is
*strongly encouraged*; students are urged to come to the office hours if they have questions, and can also email Aravind to setup alternative times if they cannot attend the regular office hours. - Reading the textbook is important; the list of sections
to read is available
**here**. - A few lectures will be rescheduled (or covered by guest lectures) during Aravind's travel, and a few office hours may be canceled. (Again, students are welcome to setup alternative meeting-times by email.)

**Homework:**

- Homework 1, due Sep. 15th.
- Homework 2, due Sep. 27th.
- Homework 3, due Oct. 6th.
- Homework 4, due Oct. 27th.
- Homework 5, due Nov. 8th.
- Homework 6, due Dec. 13th. (Problem 2 updated on Dec. 8th.)

**Approximate syllabus:**
The following is a *tentative* syllabus.
Chapter numbers refer to the table of contents available here.

- Classical vs. modern cryptography; some historical ciphers; principles of modern cryptography. (Chapter 1.)
- Perfectly-secret encryption. (Chapter 2.)
- Computational security. Symmetric-key encryption. (Chapter 3.)
- Message authentication and hash functions. (Chapter 4.)
- Block ciphers. (Chapter 5.)
- Theoretical constructions. (Sections 6.1, 6.2.)
- Number theory; cryptographic hardness assumptions and their applications. (Chapter 7.)
- The public-key revolution; Diffie-Hellman key exchange. (Chapter 9.)
- Public-key encryption. (Chapter 10.)
- Digital signatures. (Chapter 12.)
- The random oracle model and efficient cryptographic schemes. (Chapter 13.)
- As time permits, we will cover some advanced topics.

The mid-terms and final exam will be closed-book and closed-notes;
calculators and
other computing equipment will **not** be permitted.

Mid-term I will be held in class on Oct. 13, and
Mid-term II will be held in class on Nov. 17.

The chapters from the textbook for the *first mid-term* are:

- Chapter 1;
- All of Chapter 2 EXCEPT Section 2.4;
- All of Chapter 3 EXCEPT Section 3.2.2; and
- Sections 4.1, 4.2, and 4.3.

- Sections 4.4, 4.5, and 4.6.
- Only Construction 4.15 from Sec. 4.7.1 (proof not necessary).
- Chapter 5: pages 159-165 only.
- Sections 6.1 and 6.2.
- Section 7.1 (EXCEPT for Section 7.1.5); and
- Section 7.2.1.

To further exhibit your commitment to academic integrity, remember to sign the Honor Pledge on all examinations and assignments: "I pledge on my honor that I have not given or received any unauthorized assistance on this examination (assignment)."