Cryptography in the Digital World

 
Introduction to
Cryptography
 
Vipul Goyal
Vipul Goyal
Spring 2018
2
Today’s Lecture
 
Class structure, grading
Flavor of the material: covered / not covered
Background needed
Course Website:
http://www.cs.cmu.edu/~goyal/15503.html
 
(Planning around 25 lectures)
Waitlist: will clear
3
Grading
 
Three homework assignments:
10% each, total 30%
Late: 0-24 hour late lose 50% value, more than 24
hour late lose 90%
You can collaborate with other students on
homework problems
However: you must write the solutions 
on your own
Must also list the names of students you
collaborated with for each problem
Do not collaborate with more than 2 students
4
Grading
 
Scribe notes: 20%
Each student: 2 lectures
Scribe notes due 3 days after the class
Must use LaTex. Template available.
Revision due 1 week after the class
Upload on website 1 week after the class
5
Grading
 
Mid-term (in class): 25%
Final (take home): 25%
Extra credits: Class participation
Based only on quantity rather than quality of
questions!
 
Other misc:
Office hours: after class / by email
Waitlist
6
Pre-requisites
 
No background in Cryptography/Security necessary.
Following needed:
Basic mathematical maturity, e.g., comfortable with
``Definitions'' and ``Proofs''
Basic familiarity with probability
Random experiments and Random Variables,
Expectation, Union Bound, Conditional Probability
Basic familiarity with asymptotic (Big-O) notation, P
and NP complexity classes, Turing machines,
Circuits. Plus: strong puzzle solving skills.
Self-enforced
7
Cryptography
 
Life becoming more digital
Crypto: defines the rules of digital world
Imagine a society w/o rules
 
Classical motivation: secret communication
 
Code designing / code breaking: at least 2000 years
of recorded history
 
8
Cryptography Boom
 
Cryptocurrencies
Digital/electronic banking: proxy for physical banking,
need trust in bank/govt
Last few years: cryptocurrencies/blockchains
Bitcoin, Ethereum, …
 
Failure of security enforced by code
One data breach after another
Common to all: data stored in clear
Need encryption / new type of crypto
Haven’t seen: crypto being broken in real world. Why?
9
This Course: 
Modern
 Cryptography
 
Focus: rigorous security analysis
Foundation of modern crypto
 
Heuristic approaches (last several decades)
I can’t break it. Must be secure!
Deployed
Broken
 
Need provable security
10
Modern Cryptography
 
Reduction based security proofs
Algo to break scheme -> Algo to break factoring
 
What does “breaking” mean? Security of the
scheme must be defined first
 
3 steps approach:
Define
Build
Prove
11
Will Not Cover
 
Designing symmetric ciphers
AES, SHA-256, …
 
Designing symmetric ciphers
 
See list of topics on class webpage
12
TA
 
Yanzun Huang
 
yanzunh@andrew.cmu.edu
Will hold weekly office hours. Fridays 3-4pm (GHC
4101)
Slide Note

.

Embed
Share

Uncover the world of cryptography with a focus on digital advancements, emphasizing the importance of rules in society. Delve into the history of secret communication, code design, and breaking. Explore the rise of cryptocurrencies, digital banking, and blockchain technologies, such as Bitcoin and Ethereum. Prepare for a comprehensive course on cryptography essentials and its applications in today's digital landscape.

  • Cryptography Basics
  • Digital Security
  • Cryptocurrencies
  • Blockchain Technology
  • Secret Communication

Uploaded on Aug 10, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Introduction to Cryptography Vipul Goyal Spring 2018

  2. Todays Lecture Class structure, grading Flavor of the material: covered / not covered Background needed Course Website: http://www.cs.cmu.edu/~goyal/15503.html (Planning around 25 lectures) Waitlist: will clear 2

  3. Grading Three homework assignments: 10% each, total 30% Late: 0-24 hour late lose 50% value, more than 24 hour late lose 90% You can collaborate with other students on homework problems However: you must write the solutions on your own Must also list the names of students you collaborated with for each problem Do not collaborate with more than 2 students 3

  4. Grading Scribe notes: 20% Each student: 2 lectures Scribe notes due 3 days after the class Must use LaTex. Template available. Revision due 1 week after the class Upload on website 1 week after the class 4

  5. Grading Mid-term (in class): 25% Final (take home): 25% Extra credits: Class participation Based only on quantity rather than quality of questions! Other misc: Office hours: after class / by email Waitlist 5

  6. Pre-requisites No background in Cryptography/Security necessary. Following needed: Basic mathematical maturity, e.g., comfortable with ``Definitions'' and ``Proofs'' Basic familiarity with probability Random experiments and Random Variables, Expectation, Union Bound, Conditional Probability Basic familiarity with asymptotic (Big-O) notation, P and NP complexity classes, Turing machines, Circuits. Plus: strong puzzle solving skills. Self-enforced 6

  7. Cryptography Life becoming more digital Crypto: defines the rules of digital world Imagine a society w/o rules Classical motivation: secret communication Code designing / code breaking: at least 2000 years of recorded history 7

  8. Cryptography Boom Cryptocurrencies Digital/electronic banking: proxy for physical banking, need trust in bank/govt Last few years: cryptocurrencies/blockchains Bitcoin, Ethereum, Failure of security enforced by code One data breach after another Common to all: data stored in clear Need encryption / new type of crypto Haven t seen: crypto being broken in real world. Why? 8

  9. This Course: Modern Cryptography Focus: rigorous security analysis Foundation of modern crypto Heuristic approaches (last several decades) I can t break it. Must be secure! Deployed Broken Need provable security 9

  10. Modern Cryptography Reduction based security proofs Algo to break scheme -> Algo to break factoring What does breaking mean? Security of the scheme must be defined first 3 steps approach: Define Build Prove 10

  11. Will Not Cover Designing symmetric ciphers AES, SHA-256, Designing symmetric ciphers See list of topics on class webpage 11

  12. TA Yanzun Huang yanzunh@andrew.cmu.edu Will hold weekly office hours. Fridays 3-4pm (GHC 4101) 12

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#