CS 459/698 - Privacy, Crypto, Network, Data Security - Winter 2025

Schedule & Reading List

- Lecture slides and optional readings will be released shortly before each corresponding lecture.
Introduction
Lecture 1 - Logistics and Introduction to the course (Jan. 6th) Optional Readings Lecture Slides
Lec. 1 slides
Lecture 2 - Cryptography Basics (Jan. 8th) Optional Readings Lecture Slides
Boneh and Shoup (Applied Crypto) Lec. 2 slides
Data Protected at Rest
Lecture 3 - Public Key Cryptography (Jan. 13th) Optional Readings Lecture Slides
Assignment 1 released Boneh (20 years of attacks on RSA) Lec. 3 slides
Lecture 4 - Integrity (Jan. 15th) Optional Readings Lecture Slides
Marlinspike (Cryptographic Doom)
Why it's harder to forge a SHA-1 certificate than it is to find a SHA-1 collision
SHA-1 collision found
Lec. 4 slides
Lecture 5 - Discrete Logarithm and Diffie-Hellman (Jan. 20th) Optional Readings Lecture Slides
El Gamal Encryption Lec. 5 slides
Data Protected in Transit
Lecture 6 - Network Security Primer (Jan. 22nd) Optional Readings Lecture Slides
Lec. 6 slides
Lecture 7 - Authentication 101 (Jan. 27th) Optional Readings Lecture Slides
Lec. 7 slides
Lecture 8 - Authentication Protocols (Jan. 29th) Optional Readings Lecture Slides
Assignment 1 due Lec. 8 slides
Lecture 9 - Security Through the Layers (Feb. 3rd) Optional Readings Lecture Slides
Assignment 2 released Lec. 9 slides
Lecture 10 - Secure Messaging (Feb. 5th) Optional Readings Lecture Slides
OTR paper Lec. 10 slides
Lecture 11 - Network Anonymity (Feb. 10th) Optional Readings Lecture Slides
Tor design paper Lec. 11 slides
Lecture 12 - Encrypted Traffic Analysis (Feb. 12th) Optional Readings Lecture Slides
A critical eval. of WF defences Lec. 12 slides
Reading Week (Feb. 17th) Optional Readings Lecture Slides
No class No class No class
Reading Week (Feb. 19th) Optional Readings Lecture Slides
No class No class No class
Lecture 13 - Network Steganography and Information Hiding (Feb. 24th) Optional Readings Lecture Slides
Lec. 13 slides
Lecture 14 - Malicious Software (Feb. 26th) Optional Readings Lecture Slides
Botnet takeover Lec. 14 slides
Lecture 15 - Blockchain (Mar. 3rd) Optional Readings Lecture Slides
Bitcoin: A Peer-to-Peer Electronic Cash System
Ethereum Proof-of-Stake
The centralized power of decentralized mining pools
Lec. 15 slides
Midterm 1 (Mar. 5th) Optional Readings Lecture Slides
Midterm 1 in class
Data Protected During Computation
Lecture 16 - Inference Attacks (Mar. 10th) Optional Readings Lecture Slides
Assignment 2 due Lec. 16 slides
Lecture 17 - Syntatic Notions of Privacy (Mar. 12th) Optional Readings Lecture Slides
Assignment 3 released Lec. 17 slides
Lecture 18 - Differential Privacy (Mar. 17th) Optional Readings Lecture Slides
Lec. 18 slides
Lecture 19 - Multi-party Computation (Mar. 19th) Optional Readings Lecture Slides
Lec. 19 slides
Lecture 20 - Privacy-preserving Machine Learning (Mar. 24th) Optional Readings Lecture Slides
Lec. 20 slides
Lecture 21 - Adversarial Machine Learning (Mar. 26th) Optional Readings Lecture Slides
Lec. 21 slides
Lecture 22 - Homomorphic Encryption (Mar. 31st) Optional Readings Lecture Slides
Lec. 22 slides
Bonus content (Apr. 2nd) Optional Readings Lecture Slides
Assignment 3 due