The lecture slides will be made available following each lecture.
Section | Week | Topics | Class | Slides | Optional Readings |
---|---|---|---|---|---|
Foundation - Protected at rest | 1 | Logistics, intro to security and privacy, ethics/policy relevant to this course, basics of cryptography | Tuesday January 10th | lecture_1.pdf | Syllabus https://plato.stanford.edu/entries/privacy/ https://www.aclu.org/news/national-security/you-may-have-nothing-hide-you-still-have-something-fear https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/02_05_d_15/ |
Thursday January 12th | lecture_2.pdf | https://www.wisdom.weizmann.ac.il/~oded/foc-vol1.html | |||
2 | Symmetric encryption, Hash functions, MAC, Public key encryption (RSA) | Tuesday January 17th | lecture_3.pdf | ||
Thursday January 19th | lecture_4.pdf | ||||
3 | Semantic security, DLP, El Gamal, | Tuesday January 24th | lecture_5.pdf | ||
Thursday January 26th | lecture_6.pdf | ||||
Networks - Protected in transit | 4 | Network Security Primer: Firewalls, Intrusion Detection, Honeypots. Authentication Primer: Introduction and practicalities. | Tuesday January 31st | lecture_7.pdf | Chapter 11 and 12 of this textbook |
Thursday February 2nd | lecture_8.pdf | Network Simulator | |||
5 | Authentication Protocols: (Needham-Schroeder/Kerberos, SAML, etc.), DH, PKI, DNSSEC. Confidentiality: Snooping, traffic analysis (frequency analysis), side-channels, VPNs | Tuesday February 7th | lecture_9.pdf | Kerberos Tutorial cloudflare blog on DNSSEC |
|
Thursday February 9th | lecture_10.pdf | ||||
6 | TLS, WPA2, Secure email and messaging (Signal, PGP, etc.) | Tuesday February 14th | lecture_11.pdf | ||
Thursday February 16th | lecture_12.pdf | https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html https://theworld.com/~dtd/sign_encrypt/sign_encrypt7.html https://moxie.org/2015/02/24/gpg-and-me.html https://otr.cypherpunks.ca/otr-wpes.pdf https://signal.org/docs/specifications/doubleratchet/ https://signal.org/blog/simplifying-otr-deniability/ https://signal.org/docs/specifications/x3dh/ |
|||
7 | Tor, Mixes, Inference attacks (leakage from function output, background information, side channels) | Tuesday February 28th | lecture_13.pdf | ||
Thursday March 2nd | lecture_14.pdf | ||||
Data - Protected during computation | 8 | k-Anonymity, l-diversity, (t-plausibility) | Tuesday March 7th | lecture_15.pdf | |
Thursday March 9th | Midterm In Class | ||||
9 | Differential privacy (Laplace, Stats Can, etc.), Local differential privacy (randomized response, etc.) | Tuesday March 14th | lecture_16.pdf | A bunch of resources on DP |
|
Thursday March 16th | lecture_17.pdf | ||||
10 | Private Machine Learning (DP-SGD), Robustness of Machine Learning (Poisoning and Adversarial Examples) | Tuesday March 21st | lecture_18.pdf | Renyi DP Paper |
|
Thursday March 23rd | lecture_19.pdf | ||||
11 | Homomorphic encryption, Intro to MPC, PSI (commutative encryption) | Tuesday March 28th | lecture_20.pdf | Millionaires Problem |
|
Thursday March 30th | lecture_21.pdf | ||||
12 | PIR, SSE, Bonus Applied Crypto, Blockchains | Tuesday April 4th | lecture_22.pdf | ||
Thursday April 6th |