| 1 | Introduction |  | 
| 2 | User Authentication Overview, Passwords, Hashing |  | 
| 3 | Hash Functions | PS 1 Out | 
| 4 | More Hashing Applications, Unconditional Security |  | 
| 5 | Unconditional Security | PS 1 Due
  PS 2 Out  | 
| 6 | Block Ciphers, Modes of Operation |  | 
| 7 | Intro to Number-Theoretic Crypto | PS 2 Due
  PS 3 Out | 
| 8 | GCD and Modular Inverses, Generators, Discrete Logs, Diffie-Hellman Key Exchange, El Gamal Encryption and Signatures |  | 
| 9 | RSA, Chosen-Ciphertext Attacks, RSA-OAEP | PS 3 Due
  PS 4 Out | 
| 10 | Cramer-Shoup, Commitment Schemes |  | 
| 11 | Quiz 1 |  | 
| 12 | Key Agreement |  | 
| 13 | SSL, IBS, IBE and Secret Sharing | PS 4 Due | 
| 14 | Secret Sharing |  | 
| 15 | Zero-Knowledge | Project Proposal Due
  Midterm Out | 
| 16 | Watermarking and Fingerprinting (Guest Lecture) |  | 
| 17 | Tamper Resistance and Disk Forensics | Midterm Due
  PS 5 Out | 
| 18 | Physical Security: Physical Uncloneable Functions, TEMPEST |  | 
| 19 | Self-Referential Programs, Viruses, Buffer Overflow Attacks | PS 5 Due
  PS 6 Out | 
| 20 | More on Viruses | PS 6 Due | 
| 21 | Trusted Computing (NGSCB aka Palladium; TCPA) |  | 
| 22 | Trusted Computing, Java Security, Biometrics |  | 
| 23 | Quiz 2, Concluding Remarks |  | 
| 24 | Talks |  | 
| 25 | Talks |  | 
| 26 | Talks | Written Term Projects Due
  Last Day of Classes |