CS 827: Security and Cryptography
Fall Semester 2001
Manuel Blum - WeH 4113, x8-3742, email@example.com
Nick Hopper (TA) - WeH 8303, x8-2993, firstname.lastname@example.org
This course will focus on an extremely recent area of research in computer
security - Human Interactive Proofs - with the goal of significantly extending
the state of the art. The remainder of the coursework (roughly one-half)
will cover some traditional materials from number theory and cryptography.
Grading will be based on periodic homeworks as well as a midterm and a
final, dates to be announced.
The class meets Tuesdays and Thursdays from 10:30 AM to noon, starting
Thursday, September 13. The meeting location is Wean Hall room 4615A.
The recommended textbook for this course is A Course in Number
Theory and Cryptography by Neil Koblitz (ISBN 0387942939; Springer-Verlag).
It can be obtained from Amazon
& Noble. Students interested in learning more about general cryptography
might consider consulting one of the following:
Bellare and Shafi Goldwasser, "Lecture Notes on Cryptography."
Gary and Johnson, "Computers and Intractability: A guide to the theory
Hardy and Wright, "An Introduction to the Theory of Numbers."
William J. LeVeque, "Fundamentals of Number Theory."
Michael Luby, "Pseudorandomness for Cryptographic Applications."
Menezes, van Oorschot,
and Vanstone, "Handbook of Applied Cryptography."
Students should have some background in algorithms and computational complexity,
e.g. 15-451. Students may find it useful to have some background in number
theory, computer systems, or cognitive psychology.
Lecture 1 - Class Overview.
Lecture 2 - HumanOIDS.
Lecture 3 - Definitions, Homework 2. (Answer
key for Homework 2)
Lecture 4 - Factoring and Machine Learning.
Lecture 5 - PhoneOIDS protocols. (Homework
Lecture 6 - Formal Definitions for PhoneOIDS.
Lecture 7 - Parity with Noise.
Lecture 8 - Midterm Review.
Lecture 9 - Chosen Challenge Security.
(The Hunting of the Snark)
Lecture 10 - Midterm Review 2 - Assignment 4.
Lecture 11 - Midterm assignment.
Lecture 12 - CAPTCHA.
Lecture 13 - PhonOIDS and The 1/p generator.
Lecture 14 - PhonOIDS #82.
Lecture 15 - PhonOIDS #82.
Lecture 16 - CAPTCHA and the image recognition problem.
Lecture 17 - ASCII CAPTCHAs.
Lecture 18 - More on ASCII CAPTCHAs.
Lecture 19 - On the (im)possibility of ASCII CAPTCHAs.
Lecture 20 - Infeasibility of some ASCII CAPTCHAs.