Spring 2020 - CMPT 981 G100

Special Topics in Theoretical Computing Science (3)

Class Number: 6748

Delivery Method: In Person

Overview

  • Course Times + Location:

    Jan 6 – Apr 9, 2020: Wed, 1:30–2:20 p.m.
    Burnaby

    Jan 6 – Apr 9, 2020: Fri, 12:30–2:20 p.m.
    Burnaby

  • Exam Times + Location:

    Apr 22, 2020
    Wed, 12:00–3:00 p.m.
    Burnaby

Description

COURSE DETAILS:

This course focuses on cryptographic primitives and cryptosystems underlying secure communication and information protection. We will study private-key and public-key encryption, authentication, digital signatures, and commitment schemes, and see how they are used in practice, analyse what it means for them to be secure, and look at why widely-used schemes such as SSL may be insecure. We will cover a range of cryptographic applications from wifi protocols to electronic voting and blockchains.

Topics

  • Basic cryptographic primitives and respective computational assumptions
  • Private-key encryption, block ciphers
  • Public-key encryption, certificates and certificate authorities
  • Message authentication, digital signatures and hashing
  • Secure communication protocols
  • Commitment schemes, blockchains
  • Time permitting: post-quantum cryptography

Grading

NOTES:

Will be discussed in the first week of classes.

REQUIREMENTS:

Students must attain an overall passing grade on the weighted average of exams in the course in order to obtain a clear pass (C- or better).

Materials

MATERIALS + SUPPLIES:

  • Cryptography and Network Security: Principles and Practice, William Stallings, Prentice Hall, 2016, 9780134444284, 7th Edition
  • Handbook of Applied Cryptography, lfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanston, CRC-Press, 1996, 9780849385230
  • Foundations of Cryptography, Volume I, Basic Tools, Oded Goldreich, Cambridge Univ. Press, 2007, 9780521035361
  • Introduction to Modern Cryptography, Jonathan Katz, Yehuda Lindell, Chapman and Hall/CRC, 2014, 9781466570269

RECOMMENDED READING:

  • Cryptography and Network Security: Principles and Practice, William Stallings, Prentice Hall, 2016, 9780134444284, 7th Edition
  • Handbook of Applied Cryptography, lfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanston, CRC-Press, 1996, 9780849385230
  • Foundations of Cryptography, Volume I, Basic Tools, Oded Goldreich, Cambridge Univ. Press, 2007, 9780521035361
  • Introduction to Modern Cryptography, Jonathan Katz, Yehuda Lindell, Chapman and Hall/CRC, 2014, 9781466570269

Graduate Studies Notes:

Important dates and deadlines for graduate students are found here: http://www.sfu.ca/dean-gradstudies/current/important_dates/guidelines.html. The deadline to drop a course with a 100% refund is the end of week 2. The deadline to drop with no notation on your transcript is the end of week 3.

Registrar Notes:

SFU’s Academic Integrity web site http://www.sfu.ca/students/academicintegrity.html is filled with information on what is meant by academic dishonesty, where you can find resources to help with your studies and the consequences of cheating.  Check out the site for more information and videos that help explain the issues in plain English.

Each student is responsible for his or her conduct as it affects the University community.  Academic dishonesty, in whatever form, is ultimately destructive of the values of the University. Furthermore, it is unfair and discouraging to the majority of students who pursue their studies honestly. Scholarly integrity is required of all members of the University. http://www.sfu.ca/policies/gazette/student/s10-01.html

ACADEMIC INTEGRITY: YOUR WORK, YOUR SUCCESS