Cryptographic primitives are applied almost everywhere on the network, for instance, encryption and authentication. In this course, we will start from the theoretic foundations that ensures our belief in cryptography, and then we will visit some essential protocols as well as recent advances in cryptography. A major theme of this course is “provable security, “ that is, to define the desired security and then to rigorously prove the security is achieved. Hence, students are expected to be familiar with algorithms and mathematical proofs.
Please send me an email if you have questions.
Days and Times: Monday/Wednesday 2:00-3:15 pm
Location: Mechanical Engr Bldg 341
Name: Wei-Kai Lin (audio)
Email: wklin-course (at virginia dot edu)
Days and Times: Tuesdays, 9:30-11:30am (or make an appointment using email)
Location: Rice Hall 505
We will use the Canvas website to manage homework, exam, and grades. Please also use the discuss page on Canvas if you have course related questions.
There will be 4 homeworks (16% each), 1 final project (20%), and 1 final exam (16%). There will be occasional in-class quizzes that give bonus points (10%). The final grade will follow the CS Department guidelines.
The submissions shall be PDF and typeset in Tex/Latex (template will be provided).
Every student shall submit homework individually. You are free to discuss with other students in this class, but in that case, you shall add an “Acknowledgement” paragraph explicitly. Similarly, you are allowed to make use of published material as long as you cite it properly with a “References” section. In any case, it is a violation if you copy text directly, or if you are unable to explain your solution orally to me.
Each student have 4 “late days” for homework in this semester.
There may be additional rules for some homework questions.
The final project is to read research papers in the area of cryptography, to write a 2-page summary, and then to present the topic in class. In addition to summary, you are encouraged to ask novel questions or to propose novel solutions.
The project can be done individually or by a group of two. Both students in the group get the same grade. Each group is required to submit the authors and the research topic in an 1-page proposal (20%) at mid-semester. The summary (40%) is due at the end of the semester, and the last two lectures will be the presentation (40%).
The goal of this course is to define and prove security. Ideally, all your course works shall be based on the materials given in the classroom and references. You are encouraged to read other materials, but searching for ready-made solutions is discouraged because it hurts the goal. Similarly, please try not to ask for solution from people out of this class, and please try not to use generative AI.
It is a violation if any of the following cases happens:
- You copied text directly (from any source).
- You used any material or discussion without acknowledgement or citation.
- You are unable to explain your work orally to me.
Everyone is required to follow the Honor Codes of UVA and avoid plagiarism. You are recommended to use a version control system, such as Overleaf or git, so that your thought process justifies the authenticity.
Please also read detailed policies on the use of AI, accommodations, and supports.
We will follow the course of Rafael Pass in the first half, and then move on to more applications. The square-brackets refer to the material of the lecture, where the material is listed below. This schedule is tentative, and I will add more references as we move on.
Introduction and scope. Logistics. Preliminaries.
Match-making. Security definition. [Ps 1.1-1.2]
* Aug 23
- Shannon’s definition. One-time pads. Limitation of information theoretic approach. [Ps 1.3-1.4]
- Efficient computations and efficient adversaries. One-way functions (OWF). [Ps 2.1-2.2]
Prime Number Theorem. Factoring problem. Weak OWF from factoring. [Ps 2.3]
* Sep 4
- Strong OWF from weak OWF (hardness amplification). [Ps 2.4]
- Basic number theory, Discrete logarithm, candidate OWFs, one-way permutations. [Ps 2.6 2.8 2.10]
- Pseudo-Random Generators (PRG), indistinguishability, Pseudo-Random Functions (PRF)
- CPA security. Private-key encryption.
- Hard-core predicates. PRG from hard-core bits.
- Message Authentication Codes (MAC).
- Signature. Identification. * Oct
- Commitment. Zero-Knowledge proofs.
- Public-key encryption. Trapdoor permutations.
- Collision resistant hash functions. Birthday attack.
- Oblivious algorithms. Oblivious RAM.
Oblivious transfer (OT). Secure two-party computation.
Secret-sharing. Secure multi-party computation.
- Fully Homomorphic Encryption (FHE).
- Private Information Retrieval (PIR).
A Course in Cryptography. Rafael Pass and abhi shelat.
The Foundations of Cryptography. Oded Goldreich.
online access in UVA library.
[Vadhan, V] Pseudorandomness. https://people.seas.harvard.edu/~salil/pseudorandomness/pseudorandomness-published-Dec12.pdf