Skip to content

Commit

Permalink
start 2020
Browse files Browse the repository at this point in the history
  • Loading branch information
YuZhang committed Sep 12, 2020
1 parent 70b489b commit 21a71c5
Show file tree
Hide file tree
Showing 11 changed files with 510 additions and 43 deletions.
Binary file modified 0cryptography.pdf
Binary file not shown.
47 changes: 23 additions & 24 deletions 0cryptography.tex
Original file line number Diff line number Diff line change
Expand Up @@ -9,13 +9,13 @@
\begin{itemize}
\item A tremendous tool
\item The basis for many security mechanisms
\item Secure communication:
\item Secure communication/computation:
\begin{itemize}
\item web traffic: HTTPS (SSL/TLS)
\item wireless traffic: 802.11i WPA2 (and WEP), GSM, Bluetooth
\item wireless traffic: Wifi (WPA2/3), 5G (AES-128 CTR), Bluetooth (SAFER+)
\item encrypting files on disk: EFS, TrueCrypt
\item content protection: DVD (CSS), Blu-ray (AACS)
\item user authentication
\item digital rights management: Apple's FairPlay, console games
\item cryptocurrency: bitcoin
\end{itemize}
\end{itemize}
Cryptography is \textbf{NOT}:
Expand All @@ -25,6 +25,23 @@
\item Something you should try to invent yourself
\end{itemize}
\end{frame}
\begin{frame}\frametitle{Purposes}
\begin{itemize}
\item Learn what the rigorous information security is
\item Learn how to secure information rigorously
\item Learn how mathematics interplays with engineering
\end{itemize}
\end{frame}
\begin{frame}\frametitle{We will learn from Turing Award recipients}
\begin{itemize}
\item{1995} M. Blum
\item{2000} A. Yao
\item{2002} R. Rivest, A. Shamir, L. Adleman
\item{2012} S. Micali, S. Goldwasser
\item{2013} L. Lamport
\item{2015} M. E. Hellman, W. Diffie
\end{itemize}
\end{frame}
\begin{frame}\frametitle{Outline}
\begin{itemize}
\item Classic cryptography, Perfect Secrets
Expand All @@ -42,31 +59,13 @@
\end{center}
\end{figure}
\end{frame}
\begin{frame}\frametitle{We will learn from Turing Award recipients}
\begin{itemize}
\item{1995} M. Blum
\item{2000} A. Yao
\item{2002} R. Rivest, A. Shamir, L. Adleman
\item{2012} S. Micali, S. Goldwasser
\item{2013} L. Lamport
\item{2015} M. E. Hellman, W. Diffie
\end{itemize}
\end{frame}
\begin{frame}\frametitle{Purposes}
\begin{itemize}
\item Learn what the rigorous information security is
\item Learn how to secure information rigorously
\item Learn how mathematics interplays with engineering
\end{itemize}
\end{frame}
\begin{frame}\frametitle{Textbooks, Slides, \& Contact}
\begin{description}
\item[Textbook:] \textbf{Introduction to Modern Cryptography}, \emph{Jonathan Katz and Yehuda Lindell}, Chapman \& Hall/CRC.
%\item \textbf{Applied Cryptography: Protocols, Algorithms, and Source Code in C}, \emph{Bruce Schneier}, John Wiley \& Sons. (Eng. \& Chi.)
\item[MOOC:] Stanford Dan Boneh's Cryptography @Coursera
\item[Slides:] https://github.com/YuZhang/crypto2014
\item[Office:] 710 Zong-He-Lou
\item[Email:] yuzhang AT hit.edu.cn
\item[QQ group:] 1143620450 for 2020
\end{description}
\end{frame}
\begin{frame}\frametitle{Grades}
Expand All @@ -81,7 +80,7 @@
\begin{itemize}
\item Read the textbook IMC
\item Do homework by yourself
\item \alert{No Plagiarism! Otherwise, -10 point penalty each time.}
\item \alert{No Plagiarism!}
\end{itemize}
\end{itemize}
\end{frame}
Expand Down
Binary file modified 1introduction.pdf
Binary file not shown.
4 changes: 1 addition & 3 deletions 1introduction.tex
Original file line number Diff line number Diff line change
@@ -1,7 +1,5 @@
\input{main.tex}



\title{Introduction}

\begin{document}
Expand All @@ -23,7 +21,7 @@ \section{Cryptography and Modern Cryptography}
\section{The Setting of Private-Key Encryption}
\begin{frame}\frametitle{Private-Key Encryption}
\begin{itemize}
\item \textbf{Goal}: to construct a \textbf{ciphers} (encryption schemes) for providing secret communication between two parties sharing \textbf{private-key} (the symmetric-key) in advance
\item \textbf{Goal}: to construct \textbf{ciphers} (encryption schemes) for providing secret communication between two parties sharing \textbf{private-key} (the symmetric-key) in advance
\item \textbf{Implicit assumption}: there is some way of initially sharing a key in a secret manner
\item \textbf{Disk encryption}: the same user at different points in time
\end{itemize}
Expand Down
Loading

0 comments on commit 21a71c5

Please sign in to comment.