All chapters refer to the book:

  1. D. R. Stinson. CRYPTOGRAPHY: Theory and Practice. Third Edition. CRC Press. 2006.
Some parts are not covered by the book, references appear below.


Num. Topic Date Handouts Chapter from textbook
1 Introduction. 16.11.08    
2 Classic encryptions and their cryptanalysis. 17.11.08 Frequency Table
Vigenre Applet (from UCSD)
1
3 Perfect encryption systems. 23.11.08   2.1-2.3
4 Data Encryption Standard (DES). 24.11.08 DES Specification 3.5
5 Attacks on DES. Linear Cryptanalysis. 230.11.08 ppt file. [Matsui], [Matsui1] 3.5
6 Modes of Operations.
Advanced Encryption Standard (AES).
1.12.08
AES Animation, Fips 197
3.7
3.6
7 Basic Number Theory, The Euclidean Algorithm. 7.12.08  
8 Chinese Remainder and the Euler function. 8.12.08   5.2.1,5.2.2
9 The structure of Zm*, Generators and Quadratic Residues in Zp*. 14.12.08    
10 Quadratic Residues, Roots, and Primality Testing. 15.12.08    
11 Public key encryption, RSA public key encryption. 21.12.08   5.1,5.3,5.7
12 Attacks on the RSA. 22.12.08   [Boneh]
13 Diffie-Hellman Key Exchange, ElGamal Encryption. 29.12.08   6.1
14 Definition of Secure Encryption. ElGamal Encryption is Secure. 19.1.09    
15 Digital Signatures: RSA and Rabin Signatures. 25.1.09   7.1,7.2, 5.8 (modified)
16 ElGamal and DSA Signatures. 26.1.09   7.3,FIPS 186-2 - DSS
17 Cryptographic hash functions 1.2.09   4.1,4.2
18 Message authentication, CBC-MAC, HMAC. 2.2.09 BCK.pdf 4.4
19 Secure Socket Layer (SSL). 8.2.09 SSL lecture  
20 Secret Sharing. 9.2.09
21 General Secret Sharing. 15.2.09
22 Private information retrieval. 16.2.09 survey.pdf
23 Secure function evaluation. 22.2.09
24 Course summary. 23.2.09

References

[Matsui] M. Matsui. Linear Cryptanalysis Method for DES Cipher. In EUROCRYPT 93, vol. 765 of Lecture Notes in Computer Science, pages 386–397, Springer-Verlag, 1994.
[Matsui1] M. Matsui. The first experimental cryptanalysis of the Data Encryption Standard. In CRYPT0 94, vol. 839 of Lecture Notes in Computer Science, pages 1–11, Springer-Verlag, 1994.
[Boneh] D. Boneh. Twenty years of attacks on the RSA Cryptosystem. In Notices of the American Mathematical Society (AMS), Vol. 46, No. 2, pp. 203–213, 1999.
[DSS] NIST, FIPS 186-2, Digital Signature Standard (DSS).
[BCK1] M. Bellare, R. Canetti, and H. Krawczyk. The HMAC Construction (pdf). CryptoBytes, Vol. 2, No 1, pages 12-15, 1996.
[BCK2] M. Bellare, R. Canetti, and H. Krawczyk. Keying Hash Functions for Message Authentication. Abridged version appears in CRYPTO '96, vol. 1109 of Lecture Notes in Computer Science, pages 1-15, Springer-Verlag, 1996.
[Stallings] W. Stallings. Cryptography and Network Security. Second Edition. Prentice Hall. 1998.